Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
Exam 1: Introducing Todays Technologies: Computers, Devices, and the Web86 Questions
Exam 2: Connecting and Communicating Online: the Internet, Websites, and Media86 Questions
Exam 3: Computers and Mobile Devices: Evaluating Options for Home and Work86 Questions
Exam 4: Programs and Apps: Productivity, Graphics, Security, and Other Tools86 Questions
Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses86 Questions
Exam 6: Appendix: Focus on Web Development42 Questions
Select questions type
Which of the following is not a green computing recommendation?
(Multiple Choice)
5.0/5
(34)
COGNITIVE ASSESSMENT You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
(Multiple Choice)
4.8/5
(43)
Describe the reasons for and methods of two-step verification processes. What information should a user use to register?
(Essay)
4.9/5
(30)
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.
(Multiple Choice)
4.8/5
(43)
An access ______ is a security measure that defines who can access a computer, device, or network.
(Short Answer)
4.8/5
(36)
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
(True/False)
4.8/5
(46)
Viruses, worms, and trojan horses replicate themselves to other computers or devices.
(True/False)
4.8/5
(37)
A hand geometry system measures the size and shape of a person's hand.
(True/False)
4.8/5
(37)
Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.
(Essay)
4.8/5
(40)
Security experts recommend using different user names and passwords for every account.
(True/False)
4.9/5
(42)
An encryption ______ is a set of steps that converts readable text into unreadable text.
(Multiple Choice)
5.0/5
(37)
Content filtering is the process of restricting access to certain material.
(True/False)
4.8/5
(37)
What methods do phishing and spoofing scammers use? List methods to protect against phishing and spoofing scams.
(Essay)
4.8/5
(43)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)