Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

(Short Answer)
4.8/5
(34)

Which of the following categories are the rights to which creators are entitled for their work?

(Multiple Choice)
4.9/5
(36)

Which of the following is not a possessed object?

(Multiple Choice)
4.7/5
(34)

With a three-generation backup policy, the grandparent is which of the following?

(Multiple Choice)
4.9/5
(35)

Which of the following is not a security product developer?

(Multiple Choice)
4.8/5
(36)

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

(True/False)
4.8/5
(31)

COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?

(Multiple Choice)
4.9/5
(32)

Which of the following copies all of the files in a computer?

(Multiple Choice)
4.9/5
(39)

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

(Multiple Choice)
4.8/5
(39)

COGNITIVE ASSESSMENT Which of the following does your financial institution use to reduce fraud?

(Multiple Choice)
4.9/5
(37)

Many businesses use which of the following to limit employees' web access?

(Multiple Choice)
4.9/5
(32)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

(Multiple Choice)
4.9/5
(31)

COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter. Which algorithm did you use?

(Multiple Choice)
4.9/5
(36)

A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

(Short Answer)
4.9/5
(30)

____________________ is the unauthorized and illegal duplication of copyrighted software.

(Short Answer)
4.9/5
(41)

Discuss the four types of software theft.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

(Multiple Choice)
4.7/5
(30)

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

(True/False)
4.8/5
(36)

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

(Multiple Choice)
4.8/5
(29)

Websites use which of the following to keep track of items in a user's shopping cart?

(Multiple Choice)
5.0/5
(42)
Showing 141 - 160 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)