Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT What happens during a DDoS attack?

(Multiple Choice)
4.9/5
(32)

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

(True/False)
4.8/5
(42)

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

(Multiple Choice)
4.8/5
(28)

What is the term for a program that performs a repetitive task on a network?

(Multiple Choice)
4.9/5
(42)

Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

(Not Answered)
This question doesn't have any answer yet
Ask our community

  Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure. Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.8/5
(32)

COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

(Multiple Choice)
4.8/5
(41)

Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following practice IS permissible under a single-user license agreement?

(Multiple Choice)
4.8/5
(33)

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

(True/False)
4.9/5
(34)

COGNITIVE ASSESSMENT Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?

(Multiple Choice)
4.9/5
(33)

Which of the following can transmit germs?

(Multiple Choice)
4.7/5
(30)

  Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure. Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Internet advertising firms often use which of the following to collect information about users web browsing habits?

(Multiple Choice)
4.9/5
(38)

COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?

(Multiple Choice)
4.8/5
(32)

  Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?

(Multiple Choice)
4.9/5
(35)

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

(True/False)
4.7/5
(39)

Programmers often build trapdoors into programs during system development.

(True/False)
4.7/5
(41)

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

(Short Answer)
4.9/5
(38)

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.9/5
(38)

____________________ occurs when someone steals personal or confidential information.

(Short Answer)
4.8/5
(32)
Showing 21 - 40 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)