A single entry in your blog is known as a(n) ____.
What is post?
100
A password is an example of the ____ form of authentication.
What is something you know?
100
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
What is user?
100
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
What is encryption?
100
Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet.
What is hacktivists?
200
A blog is maintained by a(n) ____ with regular entries of commentary, events, or other material.
What is individual?
200
An item such as a smart card is an example of the ____ form of authentication.
What is something you have?
200
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
What is network?
200
Sites such as eBay are a popular target for ____.
What is internet fraud?
200
In the past 10 years, the digital divide in the United States has ____.
What is shrunk?
300
____ is blogging where your posts are limited in length to a sentence or two.
What is micro?
300
A ____ is commonly packaged with a new computer system.
What is rescue disk?
300
When you enter the wrong GPS position for the start point on a trip you are about to take, this is an example of ____.
What is data-entry error?
300
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
What is SSL?
300
In general, governmental computer ethics involves two main types of responsibilities: ____ and ____.
What is protection, empowerment?
400
Web 2.0 technologies provide ____ services designed specifically for sharing photos online, saving you the task of setting up a Web site or blog for this purpose.
What is online?
400
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.
What is RAID?
400
____ threats are network security threats that originate from within a network.
What is interior?
400
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
What is internet server?
400
Studying the way people use the web—what sites they visit, what products they buy, etc.—is an example of ____.
What is one-to-one marketing?
500
A domain name serves as a ____ to your Web site.
What is unique address?
500
A popular encryption method used to protect data that travels over a wireless network is ____.
What is WPA?
500
When using a public Wi-Fi network, when is it safe to send private information over the network?
What is never?
500
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
What is US-CERT?
500
The biggest challenge posed by Big Data is ____.
What is developing software to analyze the massive amount of data?