• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CS 345 Quiz 2

Study Material Jun 22, 2025
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CS 345 Quiz 2
In 2008, the _______ granted expanded authority to collect, without court-approved
warrants, international communications as they flow through the network equipment and
facilities.
Foreign Intelligence Surveillance Act Amendments Act
A(n) _____ is a device that records the originating number of incoming calls for a
particular phone number
Trap and Trace
_______ have become a common and easily created form of malware that are creating
using applications such as Visual Basic or VBScript.
Macro Viruses
The Organization for Economic Co-operation and Development's _______, established
in 1980, are often held up as the model of ethical treatment in consumer data.
Fair information practices
The _____ bars the export of data to countries that do not have data privacy protection
standards comparable to those of its member countries.
European Union Data Protection Directive
_____ are poorly trained and inadequately managed employees who mean well but
have the potential to cause much damage.
Negligent Insiders
A _____ attack keeps the target so busy responding to a stream of automated requests
that legitimate users cannot get in.
Distributed denial-of-service
In Doe v. Holder, the courts ruled that the NSL gag provision violates the _____.
First Amendment
The _____ prohibits the government from concealing the existence of any personal data
record-keeping systems.
Privacy Act
In computing, a(n) _____ is a term for any sort of general attack on an information
system that takes advantage of a particular system vulnerability.
Exploit

Download Study Material

Buy This Study Material

$11.00
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Study Material
Description:

CS 345 Quiz 2

UNLOCK ACCESS $11.00