CS 345 Quiz 2
In 2008, the _______ granted expanded authority to collect, without court-approved
warrants, international communications as they flow through the network equipment and
facilities.
Foreign Intelligence Surveillance Act Amendments Act
A(n) _____ is a device that records the originating number of incoming calls for a
particular phone number
Trap and Trace
_______ have become a common and easily created form of malware that are creating
using applications such as Visual Basic or VBScript.
Macro Viruses
The Organization for Economic Co-operation and Development's _______, established
in 1980, are often held up as the model of ethical treatment in consumer data.
Fair information practices
The _____ bars the export of data to countries that do not have data privacy protection
standards comparable to those of its member countries.
European Union Data Protection Directive
_____ are poorly trained and inadequately managed employees who mean well but
have the potential to cause much damage.
Negligent Insiders
A _____ attack keeps the target so busy responding to a stream of automated requests
that legitimate users cannot get in.
Distributed denial-of-service
In Doe v. Holder, the courts ruled that the NSL gag provision violates the _____.
First Amendment
The _____ prohibits the government from concealing the existence of any personal data
record-keeping systems.
Privacy Act
In computing, a(n) _____ is a term for any sort of general attack on an information
system that takes advantage of a particular system vulnerability.
Exploit
Category | Study Material |
Comments | 0 |
Rating | |
Sales | 0 |