100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CS 345 Quiz 2 | Questions with 100% Correct Answers $12.99   Add to cart

Exam (elaborations)

CS 345 Quiz 2 | Questions with 100% Correct Answers

 1 view  0 purchase
  • Course
  • CS 345
  • Institution
  • CS 345

CS 345 Quiz 2 | Questions with 100% Correct Answers In 2008, the _______ granted expanded authority to collect, without court-approved warrants, international communications as they flow through the network equipment and facilities. Foreign Intelligence Surveillance Act Amendments Act A(n) _____...

[Show more]

Preview 2 out of 6  pages

  • October 9, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cs 345 quiz 2
  • cs 345
  • CS 345
  • CS 345
avatar-seller
Jumuja
CS 345 Quiz 2



In 2008, the _______ granted expanded authority to collect, without court-approved
warrants, international communications as they flow through the network equipment and
facilities.
Foreign Intelligence Surveillance Act Amendments Act

A(n) _____ is a device that records the originating number of incoming calls for a
particular phone number
Trap and Trace

_______ have become a common and easily created form of malware that are creating
using applications such as Visual Basic or VBScript.
Macro Viruses

The Organization for Economic Co-operation and Development's _______, established
in 1980, are often held up as the model of ethical treatment in consumer data.
Fair information practices

The _____ bars the export of data to countries that do not have data privacy protection
standards comparable to those of its member countries.
European Union Data Protection Directive

_____ are poorly trained and inadequately managed employees who mean well but
have the potential to cause much damage.
Negligent Insiders

A _____ attack keeps the target so busy responding to a stream of automated requests
that legitimate users cannot get in.
Distributed denial-of-service

In Doe v. Holder, the courts ruled that the NSL gag provision violates the _____.
First Amendment

The _____ prohibits the government from concealing the existence of any personal data
record-keeping systems.
Privacy Act

In computing, a(n) _____ is a term for any sort of general attack on an information
system that takes advantage of a particular system vulnerability.
Exploit

, _____ is an annual gathering in Las Vegas of computer hackers.
DEFCON

In the context of the Fourth Amendment, the courts have ruled that _____.
Without a reasonable expectation of privacy, there is no privacy right

The _____ prohibits unauthorized access to stored wire and electronic communications,
such as the contents of email inboxes, instant messages, message boards, and social
networking sites.
Electronic Communications Privacy Act

The Children's Online Privacy Protection Act _____.
Does not cover the dissemination of information to children

The _____ is a federal law that provides a definition of the term cyberterrorism and
under which young people primarily involved in what they consider to be minor
computer pranks have been tried as cyberterrorists.
USA Patriot Act

Installation of a corporate _____ is the most common computer security precaution
taken by businesses.
Firewall

Spammers can defeat the registration process of free email services by launching a
coordinated _____ attack that can sign up for thousands of untraceable email accounts.
Bot

_____ test the limitations of information systems out of intellectual curiosity to see
whether they can gain access and how far they can go.
Hackers

The _____ protects against unreasonable search and seizure.
Fourth Amendment

The _____ regulates the collection of the content of wire and electronic
communications.
Wiretap Act

The _____ allows consumers to request and obtain a free credit report each year from
each of the three primary credit reporting companies.
Fair and Accurate Credit Transactions Act

A _____ is a form of Trojan horse which executes when it is triggered by a specific
event such as a change in a particular file, by typing a specific series of keystrokes, or
by a specific time or date.
logic bomb

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Jumuja. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78861 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart