Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?

(Multiple Choice)
4.8/5
(34)

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

(Multiple Choice)
4.8/5
(34)

COGNITIVE ASSESSMENT The term back door, as it refers to computer crime, is _____________.

(Multiple Choice)
4.7/5
(32)

Into which of the following kinds of ports do external fingerprint readers plug?

(Multiple Choice)
5.0/5
(30)

A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

(Short Answer)
4.7/5
(37)

Which of the following is a federally funded Internet security research and development center?

(Multiple Choice)
4.8/5
(32)

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

(Multiple Choice)
4.7/5
(42)

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

(True/False)
4.8/5
(41)

HIPAA protects individuals against the wrongful disclosure of their health information.

(True/False)
4.8/5
(25)

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

(Multiple Choice)
4.9/5
(37)

COGNITIVE ASSESSMENT The term firewall is _____________.

(Multiple Choice)
4.8/5
(45)

Both Windows and Mac operating systems include firewall capabilities.

(True/False)
4.8/5
(38)

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

(True/False)
5.0/5
(37)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.7/5
(31)

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

(Short Answer)
4.7/5
(33)

COGNITIVE ASSESSMENT The term, botnet, means _____________.

(Multiple Choice)
4.7/5
(35)

Secure sites typically use digital certificates along with security protocols.

(True/False)
5.0/5
(32)

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

(Multiple Choice)
4.8/5
(35)

COGNITIVE ASSESSMENT The term, zombie, is _____________.

(Multiple Choice)
4.9/5
(38)

COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.

(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)