Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?

(Multiple Choice)
4.8/5
(30)

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

(Short Answer)
4.8/5
(34)

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

(Multiple Choice)
4.8/5
(22)

During virtual browsing, your browser does not keep track of the websites you are visiting.

(True/False)
4.9/5
(43)

COGNITIVE ASSESSMENT What happens during a DDoS attack?

(Multiple Choice)
4.9/5
(31)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

(Multiple Choice)
4.8/5
(28)

    As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

(True/False)
4.9/5
(32)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

(Multiple Choice)
4.7/5
(36)

To read encrypted data, the recipient must decipher it into a readable form.What is the term for this process?

(Multiple Choice)
4.9/5
(41)

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?

(Multiple Choice)
4.8/5
(34)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses:
iris recognition system
piracy
Digital Millennium Copyright Act (DCMA)
Correct Answer:
Verified
Premises:
Responses:
Makes it illegal to circumvent antipiracy schemes in commercial software.
iris recognition system
(Matching)
4.8/5
(41)

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.8/5
(43)

A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

(Short Answer)
4.8/5
(44)

Combating cybercrime is not one of the FBI's top priorities.

(True/False)
4.9/5
(30)

COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.

(Multiple Choice)
4.9/5
(40)

COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

(Multiple Choice)
4.8/5
(33)

COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

(Multiple Choice)
4.8/5
(45)

Describe botnets and denial of service attacks.

(Essay)
4.8/5
(41)

COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?

(Multiple Choice)
4.8/5
(43)

COGNITIVE ASSESSMENT Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?

(Multiple Choice)
4.9/5
(31)
Showing 81 - 100 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)