Question: 4 1 . _ _ _ _ use is the use of a computer or its data for unapproved or possibly illegal activities. a .

41.____ use is the use of a computer or its data for unapproved or possibly illegal activities.
a. Unauthorized
b. Unacceptable
c. Illegitimate
d. Unenforced
42. A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
a. firewall
b. access server
c. portal
d. secure site
43.____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
a. Intrusion
b. Violation
c. Password
d. Traffic
44. Many Web sites, like that in the accompanying figure, require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers.
a. name
b. term
c. link
d. key
45. Many Web sites, like that in the accompanying figure, require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.
a. password
b. PIN
c. secure key
d. passterm
46. A ____ is a numeric password either assigned by a company or selected by a user.
a. PIN
b. passkey
c. secure number
d. secure key
47. Digital ____ is the discovery, collection, and analysis of evidence found on computers and networks.
a. forensics
b. anthropology
c. epistemology
d. reduction
48. Digital forensics is used by ____.
a. all of the above
b. military intelligence
c. insurance agencies
d. law enforcement
49. Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.
a. theft
b. piracy
c. pickpocketing
d. capture
50. Software ____ is the unauthorized and illegal duplication of copyrighted software.
a. piracy
b. theft
c. extortion
d. terrorism

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!