Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
Responses:
piracy
password
zombie
Correct Answer:
Verified
Premises:
Responses:
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
piracy
(Matching)
4.9/5
(31)

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

(Multiple Choice)
4.8/5
(41)

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

(True/False)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that performs a repetitive task on a network.
Responses:
copyright
web filtering software
Digital Millennium Copyright Act (DCMA)
Correct Answer:
Verified
Premises:
Responses:
A program that performs a repetitive task on a network.
copyright
(Matching)
5.0/5
(39)

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

(True/False)
4.8/5
(40)

Which of the following provides the mobile user with a secure connection to the company network server?

(Multiple Choice)
4.9/5
(34)

COGNITIVE ASSESSMENT Which of the following does your company use to track your time and attendance?

(Multiple Choice)
4.8/5
(38)

COGNITIVE ASSESSMENT A perpetrator is using a botnet.Which of the following is the least likely use of his botnet?

(Multiple Choice)
4.8/5
(34)

  Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?

(Multiple Choice)
4.7/5
(34)

Secure sites typically use digital certificates along with security protocols.

(True/False)
4.8/5
(32)

____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

(Short Answer)
4.8/5
(34)

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

(True/False)
4.7/5
(27)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the encrypted (scrambled) data.
Responses:
iris recognition system
AUP
DoS attack
Correct Answer:
Verified
Premises:
Responses:
In the encryption process, the encrypted (scrambled) data.
iris recognition system
(Matching)
4.9/5
(36)

COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?

(Multiple Choice)
4.9/5
(36)

COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?

(Multiple Choice)
4.7/5
(38)

FOIA enables public access to most government records.

(True/False)
4.8/5
(35)

COGNITIVE ASSESSMENT You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software.What is the term for this process?

(Multiple Choice)
4.9/5
(29)

Audit trails only record unsuccessful access attempts.

(True/False)
4.9/5
(43)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Biometric device used in high security areas.
Responses:
digital security risk
Digital Millennium Copyright Act (DCMA)
script kiddie
Correct Answer:
Verified
Premises:
Responses:
Biometric device used in high security areas.
digital security risk
(Matching)
4.8/5
(36)

COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?

(Multiple Choice)
4.8/5
(27)
Showing 101 - 120 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)