Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?
(Multiple Choice)
4.8/5
(34)
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
(Multiple Choice)
4.8/5
(34)
COGNITIVE ASSESSMENT The term back door, as it refers to computer crime, is _____________.
(Multiple Choice)
4.7/5
(32)
Into which of the following kinds of ports do external fingerprint readers plug?
(Multiple Choice)
5.0/5
(30)
A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
(Short Answer)
4.7/5
(37)
Which of the following is a federally funded Internet security research and development center?
(Multiple Choice)
4.8/5
(32)
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
(Multiple Choice)
4.7/5
(42)
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
(True/False)
4.8/5
(41)
HIPAA protects individuals against the wrongful disclosure of their health information.
(True/False)
4.8/5
(25)
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
(Multiple Choice)
4.9/5
(37)
Both Windows and Mac operating systems include firewall capabilities.
(True/False)
4.8/5
(38)
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
(True/False)
5.0/5
(37)
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
(True/False)
4.7/5
(31)
A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
(Short Answer)
4.7/5
(33)
COGNITIVE ASSESSMENT The term, botnet, means _____________.
(Multiple Choice)
4.7/5
(35)
Secure sites typically use digital certificates along with security protocols.
(True/False)
5.0/5
(32)
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
(Multiple Choice)
4.8/5
(35)
COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.
(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)