Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?

(Multiple Choice)
4.9/5
(33)

PINs are not the same as passwords.

(True/False)
4.8/5
(31)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

(Multiple Choice)
4.8/5
(39)

What is the term for a website that uses encryption techniques to protect its data?

(Multiple Choice)
4.7/5
(36)

COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

(Multiple Choice)
4.9/5
(36)

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

(Multiple Choice)
4.9/5
(35)

Combating cybercrime is not one of the FBI's top priorities.

(True/False)
4.8/5
(26)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

(Short Answer)
4.8/5
(35)

Which encryption algorithm inserts characters between existing characters?

(Multiple Choice)
4.9/5
(31)

What is another name for public key encryption?

(Multiple Choice)
4.8/5
(36)

COGNITIVE ASSESSMENT Which of the following does your company use to track your time and attendance?

(Multiple Choice)
4.9/5
(42)

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

(Short Answer)
4.7/5
(34)

  As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

(True/False)
4.8/5
(31)

COGNITIVE ASSESSMENT The term, payload, as it pertains to computer crime, is defined as _____________.

(Multiple Choice)
4.7/5
(34)

  Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program. Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

(Short Answer)
4.7/5
(25)

  A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks. A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

(Short Answer)
4.8/5
(30)

One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.

(True/False)
5.0/5
(41)

COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?

(Multiple Choice)
4.8/5
(33)

COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
4.8/5
(33)

COGNITIVE ASSESSMENT You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

(Multiple Choice)
4.8/5
(36)
Showing 161 - 180 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)