Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

(Short Answer)
4.8/5
(35)

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

(True/False)
4.9/5
(36)

Analog signatures help to prevent email forgery.

(True/False)
4.8/5
(28)

COGNITIVE ASSESSMENT What is an EULA intended to do?

(Multiple Choice)
4.9/5
(36)

How long can digital certificates be valid?

(Multiple Choice)
4.7/5
(38)

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

(True/False)
4.7/5
(46)

Many businesses use spyware to limit employees' web access.

(True/False)
5.0/5
(26)

  One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

(Multiple Choice)
4.9/5
(33)

COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

(Multiple Choice)
4.8/5
(36)

COGNITIVE ASSESSMENT In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?

(Multiple Choice)
4.9/5
(43)

It is illegal for employers to use software programs that monitor employees.

(True/False)
4.9/5
(37)

Any illegal act involving a computer generally is referred to as a computer crime.

(True/False)
4.9/5
(36)

Any device that connects to the Internet is susceptible to mobile malware.

(True/False)
4.7/5
(35)

With which of the following do users choose which folders and files to include in a backup?

(Multiple Choice)
4.9/5
(40)

The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

(Short Answer)
4.7/5
(29)

Audit trails only record unsuccessful access attempts.

(True/False)
4.8/5
(32)

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?

(Multiple Choice)
5.0/5
(39)

A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

(Short Answer)
4.8/5
(39)

____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

(Short Answer)
4.9/5
(34)

Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following is NOT permissible under a single-user license agreement?

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)