Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
COGNITIVE ASSESSMENT The term CAPTCHA is _____________.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
back door
Perpetrators of back doors trick their victims into interacting with phony websites.
(True/False)
4.8/5
(30)
COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?
(Multiple Choice)
4.9/5
(28)
COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?
(Multiple Choice)
4.8/5
(35)
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
(Multiple Choice)
4.8/5
(32)
COGNITIVE ASSESSMENT Which of the following is the least likely motive for a DDoS?
(Multiple Choice)
4.7/5
(26)
Which of the following provides the mobile user with a secure connection to the company network server?
(Multiple Choice)
4.8/5
(27)
COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
(Multiple Choice)
4.9/5
(37)
To protect yourself from social engineering scams, shred all sensitive or confidential documents.
(True/False)
4.7/5
(34)
A(n) ____________________ agreement is the right to use software.
(Short Answer)
4.8/5
(34)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
(Multiple Choice)
4.9/5
(40)
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
(Multiple Choice)
5.0/5
(33)
If you are nervous, a signature might not match the one on file in a signature verification system.
(True/False)
4.8/5
(39)
Which of the following terms refers to making a copy of a file?
(Multiple Choice)
4.9/5
(26)
Describe botnets and denial of service attacks.
(Not Answered)
This question doesn't have any answer yet
Showing 1 - 20 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)