Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Verified

site

COGNITIVE ASSESSMENT You want to ensure your wireless network is secure. Which of the following should you NOT do?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Free
(Short Answer)
4.9/5
(43)
Correct Answer:
Verified

virus

If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.

(True/False)
4.8/5
(45)

With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

(True/False)
4.8/5
(36)

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.

(Multiple Choice)
4.8/5
(36)

Which of the following best describes a single sign on account?

(Multiple Choice)
4.8/5
(37)

The destructive event or prank a malware delivers is its ______.

(Short Answer)
4.8/5
(40)

An iris recognition system uses technology to read patterns in the user's ______.

(Multiple Choice)
4.8/5
(36)

COGNITIVE ASSESSMENT If the web address of a website begins with https instead of http, what do you know about the website?

(Multiple Choice)
4.9/5
(34)

Common digital security risks include information theft and system failure.

(True/False)
4.8/5
(30)

Email spoofing rarely is used in virus hoaxes and spam.

(True/False)
5.0/5
(46)

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.

(Multiple Choice)
4.9/5
(39)

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______.

(Multiple Choice)
4.8/5
(43)

Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.

(Short Answer)
4.8/5
(33)

A(n) ______ backup copies only the files that have changed since the last full backup.

(Multiple Choice)
4.9/5
(44)

With CDP, all data is backed up whenever a change is made.

(True/False)
4.8/5
(34)

______ is the process of converting data that is readable by humans into encoded characters.

(Short Answer)
4.9/5
(40)

A(n) ______ is a program that performs a repetitive task on a network.

(Short Answer)
4.8/5
(43)

Intentionally erasing software is not an example of software theft.

(True/False)
4.7/5
(42)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)