Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

(Multiple Choice)
4.9/5
(34)

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

(True/False)
4.8/5
(39)

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

(Multiple Choice)
4.7/5
(22)

COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?

(Multiple Choice)
4.7/5
(29)

  The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure. The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

(True/False)
4.7/5
(28)

A rootkit can be a back door.

(True/False)
4.8/5
(32)

To remove spyware, users need to obtain a special program that can detect and delete it.

(True/False)
4.8/5
(29)

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

(True/False)
4.8/5
(33)

COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

(True/False)
5.0/5
(32)

Which of the following terms means in a location separate from the computer site?

(Multiple Choice)
4.7/5
(33)

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

(Short Answer)
4.9/5
(37)

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is not a frequently discussed area of computer ethics?

(Multiple Choice)
4.9/5
(36)

If a company does not have a formal email policy, it can read email messages without employee notification.

(True/False)
4.9/5
(35)

  Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure. Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

(True/False)
4.9/5
(34)

Which of the following is the process of restricting access to certain material on the web?

(Multiple Choice)
4.8/5
(42)

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

(Multiple Choice)
4.9/5
(42)

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

(Multiple Choice)
5.0/5
(35)

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

(Multiple Choice)
4.8/5
(32)

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

(True/False)
4.8/5
(38)

If a program or device has a default password, be sure to retain it.

(True/False)
4.9/5
(35)
Showing 121 - 140 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)