Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

(True/False)
4.9/5
(36)

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

(Multiple Choice)
4.8/5
(27)

Which of the following can transmit germs?

(Multiple Choice)
4.8/5
(34)

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

(Essay)
4.9/5
(37)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

(Multiple Choice)
4.7/5
(38)

If a company does not have a formal email policy, it can read email messages without employee notification.

(True/False)
4.8/5
(31)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the unencrypted, readable data.
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
ciphertext
Correct Answer:
Verified
Premises:
Responses:
In the encryption process, the unencrypted, readable data.
clickjacking
(Matching)
4.8/5
(34)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

(Multiple Choice)
4.8/5
(30)

It is illegal for employers to use software programs that monitor employees.

(True/False)
4.9/5
(46)

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

(Multiple Choice)
4.9/5
(35)

COGNITIVE ASSESSMENT Which of the following does a new federal laboratory use in its high security areas?

(Multiple Choice)
4.8/5
(40)

COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters.What is this technology?

(Multiple Choice)
4.9/5
(40)

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

(Multiple Choice)
4.8/5
(33)

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

(True/False)
4.7/5
(40)

If you are nervous, a signature might not match the one on file in a signature verification system.

(True/False)
5.0/5
(37)

COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

(Multiple Choice)
4.8/5
(32)

COGNITIVE ASSESSMENT The term, zombie, is _____________.

(Multiple Choice)
4.7/5
(39)

If a program or device has a default password, be sure to retain it.

(True/False)
4.8/5
(46)

COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?

(Multiple Choice)
4.8/5
(36)

Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy.Because this has historically been rather easy to do, the practice has become very common.As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.Which of the following practice IS permissible under a single-user license agreement?

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)