Which Of The Below Is A Common Internet Monitoring Technology
Question: Which of the below is a common Internet monitoring technology?
Answer: -Hardware key logger
-Cookie
-Key logger
-
Question: The best and most effective way to manage authentication is through ________.
Answer: Biometrics
Question: A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game. T/F
Answer: False
Question: What is spyware?
Answer: A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.
Question: What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
Answer: Pretexting
Question: Which of the following describes workplace MIS monitoring?
Answer: -Tracking people’s activities by such measures as number of transactions processed
-Tracking people’s activities by such measures as error rate
-Tracking people’s activities by such measures as number of keystrokes
-
Question: What reroutes requests for legitimate websites to false websites?
Answer: Pharming
Question: What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
Answer: Cyberbullying
Question: Which of the following is the main drawback of biometrics?
Answer: It can be costly and intrusive
Question: What are biometrics?
Answer: The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.