Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

COGNITIVE ASSESSMENT The term CAPTCHA is _____________.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Verified

back door

Perpetrators of back doors trick their victims into interacting with phony websites.

(True/False)
4.8/5
(30)

COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?

(Multiple Choice)
4.9/5
(28)

COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?

(Multiple Choice)
4.8/5
(35)

FOIA enables public access to most government records.

(True/False)
4.9/5
(33)

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

(Multiple Choice)
4.8/5
(32)

COGNITIVE ASSESSMENT Which of the following is the least likely motive for a DDoS?

(Multiple Choice)
4.7/5
(26)

Which of the following provides the mobile user with a secure connection to the company network server?

(Multiple Choice)
4.8/5
(27)

COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

(Multiple Choice)
4.9/5
(37)

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

(True/False)
4.7/5
(34)

A(n) ____________________ agreement is the right to use software.

(Short Answer)
4.8/5
(34)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

(Multiple Choice)
4.9/5
(40)

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

(Multiple Choice)
5.0/5
(33)

Biometric objects are entirely foolproof.

(True/False)
4.8/5
(29)

If you are nervous, a signature might not match the one on file in a signature verification system.

(True/False)
4.8/5
(39)

Which of the following terms refers to making a copy of a file?

(Multiple Choice)
4.9/5
(26)

COGNITIVE ASSESSMENT What is an AUP intended to do?

(Multiple Choice)
4.9/5
(43)

Describe botnets and denial of service attacks.

(Not Answered)
This question doesn't have any answer yet
Ask our community
Showing 1 - 20 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)