Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

(Multiple Choice)
4.9/5
(38)

Which of the following categories are the rights to which creators are entitled for their work?

(Multiple Choice)
4.8/5
(27)

One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.

(True/False)
4.7/5
(33)

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

(Multiple Choice)
4.8/5
(33)

COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter.Which algorithm did you use?

(Multiple Choice)
4.7/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects a network's resources from intrusion.
Responses:
zombie
CA
AUP
Correct Answer:
Verified
Premises:
Responses:
Protects a network's resources from intrusion.
zombie
(Matching)
4.7/5
(31)

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

(Multiple Choice)
5.0/5
(45)

    Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure. Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

(Essay)
4.8/5
(36)

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics.There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.Which of the following is NOT a question of computer ethics?

(Multiple Choice)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An authorized person or company that issues and verifies digital certificates.
Responses:
password
digital certificate
copyright
Correct Answer:
Verified
Premises:
Responses:
An authorized person or company that issues and verifies digital certificates.
password
(Matching)
4.8/5
(43)

  One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers.What was that percentage? One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers.What was that percentage?

(Multiple Choice)
4.9/5
(44)

COGNITIVE ASSESSMENT The term, payload, as it pertains to computer crime, is defined as _____________.

(Multiple Choice)
4.8/5
(44)

COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?

(Multiple Choice)
4.9/5
(38)

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

(Multiple Choice)
4.9/5
(44)

COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

(Multiple Choice)
4.9/5
(35)

Which of the following is not a possessed object?

(Multiple Choice)
4.8/5
(41)

COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?

(Multiple Choice)
4.9/5
(34)

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

(True/False)
4.8/5
(37)

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

(True/False)
4.8/5
(40)

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

(True/False)
4.8/5
(38)
Showing 61 - 80 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)