Exam 5: Digital Security Ethics and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT a part of a typical single-user license agreement?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Badges, cards, smart cards, and keys are examples of _____ objects.

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

C

Email spoofing rarely is used in virus hoaxes and spam.

Free
(True/False)
5.0/5
(46)
Correct Answer:
Verified

False

Software used to fight cybercriminals is called crimeware.

(True/False)
4.8/5
(34)

Passcode is another term for a(n) ______.

(Multiple Choice)
4.8/5
(31)

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

(True/False)
4.7/5
(40)

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.

(Multiple Choice)
4.9/5
(28)

Which of the following is not recommended to protect against hardware failure?

(Multiple Choice)
4.8/5
(26)

A password ______ is a service that stores all of your account information securely.

(Multiple Choice)
4.8/5
(26)
Identify the letter of the choice that best matches the phrase or definition.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
digital certificate
An authorized person or company that issues and verifies digital certificates
bot
A notice that guarantees a user or a website is legitimate
plaintext
Correct Answer:
Verified
Premises:
Responses:
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
digital certificate
An authorized person or company that issues and verifies digital certificates
bot
A notice that guarantees a user or a website is legitimate
plaintext
A group of compromised computers
CA
The unauthorized and illegal duplication of copyrighted software
clickjacking
An assault whose purpose is to disrupt computer access to an Internet service
firewall
In the encryption process, the unencrypted, readable data
botnet
Outlines the activities for which a computer or network may and may not be used
AUP
A scam in which a button or link on a website contains a malicious program
script kiddie
Any event or action that could cause a loss of or damage to computer or mobile device hardware
DoS attack
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
digital security risk
Hacker who usually does not have advanced computer and technical skills
zombie
Protects a network's resources from intrusion
digital signature
A program that performs a repetitive task on a network
ciphertext
In the encryption process, the encrypted (scrambled) data
piracy
(Matching)
4.9/5
(27)

Intentionally erasing software is not an example of software theft.

(True/False)
5.0/5
(30)

An encryption ______ is a set of steps that converts readable text into unreadable text.

(Multiple Choice)
4.9/5
(39)

What does a keygen do?

(Multiple Choice)
4.7/5
(42)

Viruses, worms, and trojan horses replicate themselves to other computers or devices.

(True/False)
4.7/5
(34)

List methods to protect computers, mobile devices, and networks from attacks.

(Essay)
4.9/5
(38)

Common digital security risks include information theft and system failure.

(True/False)
4.8/5
(39)

You should disable GPS tracking on your mobile device unless you need to use it.

(True/False)
4.8/5
(42)

Another term for botnet is ______ army.

(Multiple Choice)
4.9/5
(43)

A digital ______ is a notice that guarantees a user or website is legitimate.

(Short Answer)
4.9/5
(33)

COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)