Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a green computing recommendation?

(Multiple Choice)
5.0/5
(34)

COGNITIVE ASSESSMENT You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

(Multiple Choice)
4.8/5
(43)

Piracy is the most common form of software theft.

(True/False)
4.8/5
(36)

Describe the reasons for and methods of two-step verification processes. What information should a user use to register?

(Essay)
4.9/5
(30)

COGNITIVE ASSESSMENT What should an AUP specify?

(Multiple Choice)
4.8/5
(41)

Describe how users and manufacturers protect against software theft.

(Essay)
4.8/5
(39)

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.

(Multiple Choice)
4.8/5
(43)

An access ______ is a security measure that defines who can access a computer, device, or network.

(Short Answer)
4.8/5
(36)

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

(True/False)
4.8/5
(46)

Viruses, worms, and trojan horses replicate themselves to other computers or devices.

(True/False)
4.8/5
(37)

A(n) ______ demands payment to stop an attack.

(Multiple Choice)
4.7/5
(39)

A hand geometry system measures the size and shape of a person's hand.

(True/False)
4.8/5
(37)

Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.

(Essay)
4.8/5
(40)

Security experts recommend using different user names and passwords for every account.

(True/False)
4.9/5
(42)

Malware is short for ______ software.

(Multiple Choice)
4.9/5
(37)

Another term for botnet is ______ army.

(Multiple Choice)
4.9/5
(38)

An encryption ______ is a set of steps that converts readable text into unreadable text.

(Multiple Choice)
5.0/5
(37)

Content filtering is the process of restricting access to certain material.

(True/False)
4.8/5
(37)

What methods do phishing and spoofing scammers use? List methods to protect against phishing and spoofing scams.

(Essay)
4.8/5
(43)

Encryption is one safeguard against information theft.

(True/False)
4.9/5
(38)
Showing 21 - 40 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)