Exam 6: Creating, sorting, and Querying a Table

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What would a password manager allow you to do?

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

B

How can an attacker execute malware through a script?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B

How does encryption work?

(Multiple Choice)
4.8/5
(38)

Choose the strongest password.

(Multiple Choice)
5.0/5
(37)

In which of the following real-life situations would it be useful to use a digital certificate?

(Multiple Choice)
4.9/5
(41)

How is the environment impacted by computers being thrown away in landfills?

(Multiple Choice)
4.8/5
(36)

How can you protect your information when using social media?

(Multiple Choice)
4.9/5
(24)

Marcus recently had his cell phone stolen.All of the following are security features that should help him locate his stolen phone EXCEPT which one?

(Multiple Choice)
4.8/5
(28)

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

(Multiple Choice)
4.8/5
(31)

How can you protect a computer from electrical spikes and surges?

(Multiple Choice)
4.9/5
(38)

You are watching the news and learn that there has been a security breach of credit card information at a large department store.The news report also states that the same company has had recent layoffs.The report says that the company is looking into whether or not the breach was done by an insider.Why would the company investigate the possibility of the breach being from an insider?

(Multiple Choice)
4.8/5
(40)

To prevent a laptop from being stolen,you can use a timelock device.

(True/False)
4.9/5
(35)

With more and more people using technology,what physical health diagnosis is on the rise?

(Multiple Choice)
4.7/5
(38)

Technology can lead to all of the following behavioral risks EXCEPT _____.

(Multiple Choice)
4.9/5
(31)

What is a digital certificate?

(Multiple Choice)
4.9/5
(40)

A Trojan is a malicious program that uses a computer network to replicate.

(True/False)
4.9/5
(35)

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

(True/False)
4.9/5
(25)

How could an online attacker use your online profile to gather information about you to steal your identity?

(Multiple Choice)
4.8/5
(29)

In terms of privacy,which of the following is a best practice?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)