Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
Responses:
piracy
password
zombie
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(31)
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
(Multiple Choice)
4.8/5
(41)
One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
(True/False)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that performs a repetitive task on a network.
Responses:
copyright
web filtering software
Digital Millennium Copyright Act (DCMA)
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(39)
Websites often collect data about you so that they can customize advertisements and send you personalized email messages.
(True/False)
4.8/5
(40)
Which of the following provides the mobile user with a secure connection to the company network server?
(Multiple Choice)
4.9/5
(34)
COGNITIVE ASSESSMENT Which of the following does your company use to track your time and attendance?
(Multiple Choice)
4.8/5
(38)
COGNITIVE ASSESSMENT A perpetrator is using a botnet.Which of the following is the least likely use of his botnet?
(Multiple Choice)
4.8/5
(34)
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?

(Multiple Choice)
4.7/5
(34)
Secure sites typically use digital certificates along with security protocols.
(True/False)
4.8/5
(32)
____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.
(Short Answer)
4.8/5
(34)
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
(True/False)
4.7/5
(27)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the encrypted (scrambled) data.
Responses:
iris recognition system
AUP
DoS attack
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(36)
COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?
(Multiple Choice)
4.9/5
(36)
COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?
(Multiple Choice)
4.7/5
(38)
COGNITIVE ASSESSMENT You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software.What is the term for this process?
(Multiple Choice)
4.9/5
(29)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Biometric device used in high security areas.
Responses:
digital security risk
Digital Millennium Copyright Act (DCMA)
script kiddie
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?
(Multiple Choice)
4.8/5
(27)
Showing 101 - 120 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)