Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
Verified

D

Many businesses use which of the following to limit employees' web access?

Free
(Multiple Choice)
5.0/5
(28)
Correct Answer:
Verified

A

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

(True/False)
4.7/5
(32)

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

(Short Answer)
4.8/5
(33)

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

(True/False)
4.8/5
(32)

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

(Multiple Choice)
4.8/5
(44)

Which of the following terms means in a location separate from the computer site?

(Multiple Choice)
4.9/5
(36)

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

(Short Answer)
4.8/5
(38)

Which of the following copies all of the files in a computer?

(Multiple Choice)
4.9/5
(38)

COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
4.9/5
(30)

Analog signatures help to prevent email forgery.

(True/False)
4.9/5
(33)

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

(Short Answer)
4.7/5
(31)

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Short Answer)
4.7/5
(38)

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

(Multiple Choice)
4.9/5
(33)

COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter.Which algorithm did you use?

(Multiple Choice)
4.9/5
(43)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.8/5
(38)

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

(Short Answer)
4.7/5
(45)

Discuss the measures you can take to safeguard home computers and devices.

(Essay)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects any tangible form of expression.
Responses:
ciphertext
piracy
DoS attack
Correct Answer:
Verified
Premises:
Responses:
Protects any tangible form of expression.
ciphertext
(Matching)
4.9/5
(31)
Showing 1 - 20 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)