Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.8/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
A notice that guarantees a user or a website is legitimate.
botnet
A common infringement of copyright.
digital security risk
A scam in which a button or link on a website contains a malicious program.
digital signature
Correct Answer:
Verified
Premises:
Responses:
A notice that guarantees a user or a website is legitimate.
botnet
A common infringement of copyright.
digital security risk
A scam in which a button or link on a website contains a malicious program.
digital signature
Most systems require that a user selects this on his or her own.
DoS attack
Protects any tangible form of expression.
Digital Millennium Copyright Act (DCMA)
In the encryption process, the unencrypted, readable data.
digital certificate
A program that performs a repetitive task on a network.
piracy
A program that restricts access to specified websites.
ciphertext
Protects a network's resources from intrusion.
plaintext
Usually does not have advanced computer and technical skills.
iris recognition system
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
password
In the encryption process, the encrypted (scrambled) data.
CA
An assault whose purpose is to disrupt computer access to an Internet service
web filtering software
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
script kiddie
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
copyright
A group of compromised computers.
clickjacking
Outlines the activities for which a computer or network may and may not be used.
AUP
Biometric device used in high security areas.
firewall
An authorized person or company that issues and verifies digital certificates.
zombie
Makes it illegal to circumvent antipiracy schemes in commercial software.
bot
(Matching)
5.0/5
(35)

COGNITIVE ASSESSMENT Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

(Multiple Choice)
4.9/5
(37)

COGNITIVE ASSESSMENT Which of the following does your college use to verify your identity?

(Multiple Choice)
4.9/5
(36)

COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

(Multiple Choice)
4.9/5
(38)

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Short Answer)
4.8/5
(37)

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

(True/False)
4.8/5
(27)

COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?

(Multiple Choice)
4.9/5
(30)

Your browsing history is a list of all websites you have visited over a period of time.

(True/False)
4.8/5
(30)

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

(Short Answer)
4.9/5
(37)

COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?

(Multiple Choice)
4.9/5
(33)

COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?

(Multiple Choice)
4.7/5
(39)

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

(True/False)
4.8/5
(29)

COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

(Multiple Choice)
4.8/5
(36)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?

(Multiple Choice)
4.8/5
(34)

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.9/5
(39)

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

(Multiple Choice)
4.7/5
(25)

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

(True/False)
4.8/5
(28)

Proximity sharing gives websites access to your current location.

(True/False)
4.7/5
(35)

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

(Multiple Choice)
4.8/5
(30)
Showing 81 - 100 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)