Exam 5: Digital Security Ethics and Privacy
Exam 1: Introducing Todays Technologies86 Questions
Exam 2: Connecting and Communicating Online86 Questions
Exam 3: Computers and Mobile Devices86 Questions
Exam 4: Programs and Apps86 Questions
Exam 5: Digital Security Ethics and Privacy86 Questions
Exam 6: Computing Components86 Questions
Exam 7: Input and Output86 Questions
Exam 8: Digital Storage86 Questions
Exam 9: Operating Systems86 Questions
Exam 10: Communicating Digital Content86 Questions
Exam 11: Building Solutions86 Questions
Exam 12: Working in the Enterprise: Systems, Certifications86 Questions
Exam 13: Focus on Web Development42 Questions
Select questions type
Which of the following is NOT a part of a typical single-user license agreement?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Badges, cards, smart cards, and keys are examples of _____ objects.
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
Email spoofing rarely is used in virus hoaxes and spam.
Free
(True/False)
5.0/5
(46)
Correct Answer:
False
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
(True/False)
4.7/5
(40)
Critical Thinking Questions Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
(Multiple Choice)
4.9/5
(28)
Which of the following is not recommended to protect against hardware failure?
(Multiple Choice)
4.8/5
(26)
A password ______ is a service that stores all of your account information securely.
(Multiple Choice)
4.8/5
(26)
Identify the letter of the choice that best matches the phrase or definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(27)
Intentionally erasing software is not an example of software theft.
(True/False)
5.0/5
(30)
An encryption ______ is a set of steps that converts readable text into unreadable text.
(Multiple Choice)
4.9/5
(39)
Viruses, worms, and trojan horses replicate themselves to other computers or devices.
(True/False)
4.7/5
(34)
List methods to protect computers, mobile devices, and networks from attacks.
(Essay)
4.9/5
(38)
Common digital security risks include information theft and system failure.
(True/False)
4.8/5
(39)
You should disable GPS tracking on your mobile device unless you need to use it.
(True/False)
4.8/5
(42)
A digital ______ is a notice that guarantees a user or website is legitimate.
(Short Answer)
4.9/5
(33)
COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)