100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COSC 1301 Final Exam Questions and All Correct Answers $12.59   Add to cart

Exam (elaborations)

COSC 1301 Final Exam Questions and All Correct Answers

 4 views  0 purchase
  • Course
  • COSC 1301
  • Institution
  • COSC 1301

COSC 1301 Final Exam Questions and All Correct Answers A driver's license, a speeding ticket, a birth certificate - Answer-government databases Symantec's MessageLabs recently estimated that more than ____ percent of all email messages is spam. - Answer-90 FDE devices are designed to withst...

[Show more]

Preview 4 out of 34  pages

  • August 29, 2024
  • 34
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • COSC 1301
  • COSC 1301
avatar-seller
Scholarsstudyguide
COSC 1301 Final Exam Questions and
All Correct Answers

A driver's license, a speeding ticket, a birth certificate - Answer-government databases

Symantec's MessageLabs recently estimated that more than ____ percent of all email
messages is spam. - Answer-90

FDE devices are designed to withstand much more physical abuse than conventional
devices. - Answer-False

The best protection against many dot cons is ____. - Answer-protecting your identity

All 50 U.S. states have made cyberstalking illegal. - Answer-True

To protect hardware from damage due to power fluctuations, everyone should use a(n)
____________________ with a computer whenever it is plugged into a power outlet. -
Answer-surge suppressor*

A UPS is designed to provide enough power for a computer to remain briefly powered
up if the electricity goes off. - Answer-True

A(n) ____ prevents power spikes from harming your computer system. - Answer-surge
suppressor

Referring to the text in this chapter, CPO stands for ___ - Answer-chief privacy officer

You study a series of real-life issues to determine what kind of security and/or privacy
threat you are facing.

Lastly, you are planning to do a lot of business travel in the near future. You will be
bringing your laptop computer with you. You look into ways to secure the information on
your computer, and decide that the most secure is to ____. - Answer-install a hard drive
that uses FDE

____ is a generic term that refers to any type of malicious software. - Answer-Malware

Market filtering refers to following a predesignated procedure to remove yourself from
marketing lists, or otherwise preventing your personal information from being obtained
or shared by others. - Answer-False

,A hacker changing the IP addresses used in conjunction with a particular company's
Web site to re-route them to the hacker's servers is called DNS
____________________. - Answer-poisoning*

Often, a worm is sent to other computers via an email ____________________. -
Answer-attachment*

The text lists all of the following as dangerous to a computer EXCEPT ____. - Answer-
dryness

____ devices are designed to withstand much more physical abuse than conventional
devices. - Answer-Ruggedized

A group of zombie computers controlled by one individual, working together in a
coordinated fashion, is called a(n) ____ - Answer-botnet

Each question contains a brief list of things commonly associated with daily life.
Examine the list, then choose the answer that most closely correlates to the list.

U.S. SAFE WEB, Real ID, Graham-Leach-Bliley - Answer-computer security and
privacy legislation

____ technology is the ability of one computing device on a network to identify another
device on the same network and determine its status - Answer-Presence

You have found an interesting calendar program at a Web site and downloaded it to
help you stay organized. However, within a couple days of installing the program, your
computer starts behaving oddly. Strange popups appear, the home page of your
Internet browser has been switched, and the system is running sluggishly. You likely
have installed a ____. - Answer-Trojan horse

A document with a(n) ____ guarantees that the document was indeed sent by a specific
individual and that it hasn't been tampered with after it was sent. - Answer-digital
signature

____ emails are directly targeted to a specific individual, usually in order to steal
intellectual property. - Answer-Spear phishing

Computer crimes involving online fraud, theft, scams, and related activities designed to
steal money or other resources from individuals or businesses are collectively referred
to as ___________________ - Answer-dot cons*

DDoS attacks are typically performed by botnets. - Answer-True

Digital certificates are granted to a user by the ISP that hosts the user's account. -
Answer-False

,Dot con software protects a computer against malware. - Answer-False

The URL for Web pages using SSL begins with https:. - Answer-True

A(n) ____ creates a barrier between a computer or network and the Internet in order to
protect against unauthorized access. - Answer-firewall

The accompanying figure is an example of ____________________.
(cartoon of company selling user info) - Answer-electronic profiling*

______________________________ Internet access is a direct connection that
transmits via standard telephone lines, but does not tie up your telephone line. -
Answer-DSL*

Router manufacturer, maker of the latest Web browser, computer designer are ____ -
Answer-hardware and software companies

____ is available in selected areas, uses transmission towers, and can reach speeds
typically up to 6 Mbps. - Answer-Fixed wireless

According to FBI statistics, the recovery rate of a lost or stolen personal computer is
about ____ percent. - Answer-2-3

____________________ involves terrorists launching an attack via the Internet. -
Answer-cyberterrorism*

Hacking most often occurs ____. - Answer-over the Internet or another network

Unlike ____, ____ cannot replicate themselves. - Answer-worms, Trojan horses

The terms "Internet" and "World Wide Web" are interchangeable. - Answer-False

Tim Berners-Lee proposed the idea of email. - Answer-False

A Web site's home page appears when you type the domain name and top-level domain
of a Web site. - Answer-True

Keying multiple keywords are sometimes called a search engine. - Answer-False

The Internet Explorer Favorites tab tracks the Web pages you visit over a certain time
period, not just during a browsing session. - Answer-False

Microsoft Windows Live Mail is an example of email software. - Answer-True

A cookie is a file that you send with an email message. - Answer-False

, Third-party cookies are placed on your hard drive by a company other than the one
associated with the Web page you are viewing—typically a Web advertising company. -
Answer-True

DSL uses a direct connection and is "currently" (according to textbook) the most widely
used type of home broadband connection. - Answer-False

Wireless networks usually use ____ signals to send data. - Answer-radio

A(n) ____ network uses a central cable to which all network devices connect. - Answer-
bus

The way a network is designed to communicate is known as its ____. - Answer-
architecture

A(n) ____ is a computer that requests and uses network resources from a(n) ____. -
Answer-client, server

In the accompanying figure, ____ is the first step in connecting to a Wi-Fi hotspot. -
Answer-Click the wireless network icon.

What can you tell from the accompanying figure? - Answer-PadNet is the only Wi-Fi
hotspot in range that is broadcasting its name openly.

A network consisting of a person's portable computer, mobile phone, and digital camera
would be considered a ____. - Answer-PAN

Microsoft and Google have created large networks known as ____ to provide free or
low-cost Internet access to area residents. - Answer-MANs

A company network that is accessible to authorized outsiders is called a(n) ____. -
Answer-extranet

A(n) ____ is a secure, private path across a public network that is set up to allow
authorized users private, secure access to the company network - Answer-VPN

Most networking media send data using ____ signals. - Answer-digital

With ____ transmission, data is sent one bit at a time. - Answer-serial

Serial transmission may involve any of the following techniques EXCEPT ____
transmission. - Answer-metasynchronous

In the accompanying figure, ____ box represents asynchronous transmission. - Answer-
the middle

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.59
  • (0)
  Add to cart