Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

PINs are not the same as passwords.

(True/False)
4.9/5
(27)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that restricts access to specified websites.
Responses:
bot
ciphertext
firewall
Correct Answer:
Verified
Premises:
Responses:
A program that restricts access to specified websites.
bot
(Matching)
4.8/5
(37)

Which of the following is the process of restricting access to certain material on the web?

(Multiple Choice)
4.8/5
(37)

Your browsing history is a list of all websites you have visited over a period of time.

(True/False)
4.9/5
(34)

COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?

(Multiple Choice)
4.8/5
(39)

____________________ occurs when someone steals personal or confidential information.

(Short Answer)
4.8/5
(38)

COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?

(Multiple Choice)
4.8/5
(36)

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics.There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.Which of the following is not a frequently discussed area of computer ethics?

(Multiple Choice)
4.7/5
(43)

    Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure. Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

(True/False)
4.9/5
(35)

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

(Multiple Choice)
4.9/5
(34)

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

(Short Answer)
4.7/5
(43)

Biometric objects are entirely foolproof.

(True/False)
4.8/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An assault whose purpose is to disrupt computer access to an Internet service
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
AUP
Correct Answer:
Verified
Premises:
Responses:
An assault whose purpose is to disrupt computer access to an Internet service
clickjacking
(Matching)
4.8/5
(39)

Any device that connects to the Internet is susceptible to mobile malware.

(True/False)
4.8/5
(32)

COGNITIVE ASSESSMENT Which of the following does your financial institution use to reduce fraud?

(Multiple Choice)
4.8/5
(38)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

(Short Answer)
4.8/5
(36)

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

(Multiple Choice)
4.9/5
(28)

COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.8/5
(35)

Into which of the following kinds of ports do external fingerprint readers plug?

(Multiple Choice)
4.7/5
(41)

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

(True/False)
4.9/5
(33)
Showing 141 - 160 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)