Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

    Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure. Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.9/5
(36)

    A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks. A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

(Short Answer)
4.9/5
(36)

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

(True/False)
4.8/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Most systems require that a user selects this on his or her own.
Responses:
firewall
zombie
clickjacking
Correct Answer:
Verified
Premises:
Responses:
Most systems require that a user selects this on his or her own.
firewall
(Matching)
4.9/5
(38)

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

(True/False)
4.9/5
(48)

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

(Multiple Choice)
4.8/5
(27)

Perpetrators of back doors trick their victims into interacting with phony websites.

(True/False)
4.8/5
(40)

What is the term for a program that performs a repetitive task on a network?

(Multiple Choice)
4.8/5
(40)

COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?

(Multiple Choice)
4.8/5
(36)

How long can digital certificates be valid?

(Multiple Choice)
4.9/5
(43)

With a three-generation backup policy, the grandparent is which of the following?

(Multiple Choice)
4.8/5
(46)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A group of compromised computers.
Responses:
digital signature
iris recognition system
piracy
Correct Answer:
Verified
Premises:
Responses:
A group of compromised computers.
digital signature
(Matching)
4.9/5
(33)

Programmers often build trapdoors into programs during system development.

(True/False)
4.9/5
(26)

COGNITIVE ASSESSMENT What is an EULA intended to do?

(Multiple Choice)
5.0/5
(41)

Which of the following terms refers to making a copy of a file?

(Multiple Choice)
4.7/5
(39)

What is the term for a website that uses encryption techniques to protect its data?

(Multiple Choice)
4.7/5
(40)

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

(True/False)
4.9/5
(30)

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

(Short Answer)
4.8/5
(41)

Any illegal act involving a computer generally is referred to as a computer crime.

(True/False)
4.7/5
(41)

COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

(Multiple Choice)
4.7/5
(38)
Showing 181 - 200 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)