Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

(True/False)
4.9/5
(26)

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

(Multiple Choice)
4.9/5
(43)

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

(True/False)
4.8/5
(31)

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

(Not Answered)
This question doesn't have any answer yet
Ask our community

How much do fingerprint readers typically cost?

(Multiple Choice)
4.8/5
(27)

COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.7/5
(33)

COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

(Multiple Choice)
4.9/5
(33)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

(Multiple Choice)
4.9/5
(38)

During virtual browsing, your browser does not keep track of the websites you are visiting.

(True/False)
4.9/5
(31)

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

(Multiple Choice)
4.7/5
(26)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

(Multiple Choice)
4.7/5
(32)

Which of the following is an authorized person or company that issues and verifies digital certificates?

(Multiple Choice)
4.9/5
(39)

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

(Multiple Choice)
4.9/5
(33)

  Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

(Multiple Choice)
4.7/5
(42)

COGNITIVE ASSESSMENT Which of the following does a new federal laboratory use in its high security areas?

(Multiple Choice)
4.9/5
(35)

Discuss the measures you can take to safeguard home computers and devices.

(Not Answered)
This question doesn't have any answer yet
Ask our community

COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?

(Multiple Choice)
4.8/5
(39)

COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?

(Multiple Choice)
4.8/5
(36)

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

(True/False)
4.8/5
(37)

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

(Multiple Choice)
4.8/5
(33)
Showing 101 - 120 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)