Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT The term, botnet, means _____________.

(Multiple Choice)
4.7/5
(44)

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

(Multiple Choice)
4.8/5
(31)

Many businesses use spyware to limit employees' web access.

(True/False)
4.7/5
(47)

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.9/5
(40)

COGNITIVE ASSESSMENT Which of the following does your college use to verify your identity?

(Multiple Choice)
4.8/5
(39)

Both Windows and Mac operating systems include firewall capabilities.

(True/False)
4.7/5
(36)

COGNITIVE ASSESSMENT Which of the following is the least likely motive for a DDoS?

(Multiple Choice)
4.9/5
(38)

Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer.Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

(Essay)
4.8/5
(38)

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

(Multiple Choice)
4.9/5
(39)

COGNITIVE ASSESSMENT The term firewall is _____________.

(Multiple Choice)
4.8/5
(37)

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

(Multiple Choice)
4.9/5
(37)

COGNITIVE ASSESSMENT The term back door, as it refers to computer crime, is _____________.

(Multiple Choice)
4.8/5
(40)

Which of the following is a federally funded Internet security research and development center?

(Multiple Choice)
4.8/5
(47)

Internet advertising firms often use which of the following to collect information about users web browsing habits?

(Multiple Choice)
4.9/5
(40)

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.9/5
(41)

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

(Multiple Choice)
4.8/5
(49)

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

(True/False)
4.9/5
(45)

Proximity sharing gives websites access to your current location.

(True/False)
4.9/5
(33)

Websites use which of the following to keep track of items in a user's shopping cart?

(Multiple Choice)
4.9/5
(38)

  Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources.What is the term for this combination of characters? Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources.What is the term for this combination of characters?

(Multiple Choice)
4.9/5
(36)
Showing 121 - 140 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)