Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?
(Multiple Choice)
4.9/5
(40)
With which of the following do users choose which folders and files to include in a backup?
(Multiple Choice)
4.9/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Responses:
digital signature
bot
copyright
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(36)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A notice that guarantees a user or a website is legitimate.
Responses:
piracy
web filtering software
digital signature
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(24)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Outlines the activities for which a computer or network may and may not be used.
Responses:
zombie
digital security risk
bot
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(47)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A scam in which a button or link on a website contains a malicious program.
Responses:
digital signature
DoS attack
Digital Millennium Copyright Act (DCMA)
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?
(Multiple Choice)
4.9/5
(34)
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
(True/False)
4.9/5
(39)
A(n) ____________________ agreement is the right to use software.
(Short Answer)
4.9/5
(25)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
(Multiple Choice)
4.8/5
(45)
To remove spyware, users need to obtain a special program that can detect and delete it.
(True/False)
4.7/5
(35)
COGNITIVE ASSESSMENT In your encryption algorithm, you swapped adjacent characters.Which algorithm did you use?
(Multiple Choice)
4.9/5
(40)
Which of the following is not a security product developer?
(Multiple Choice)
4.9/5
(36)
Which encryption algorithm inserts characters between existing characters?
(Multiple Choice)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Responses:
digital security risk
digital signature
clickjacking
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(44)
A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
(Short Answer)
4.8/5
(35)
Showing 161 - 180 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)