Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT Which of the following is NOT true about CAPTCHAs?

(Multiple Choice)
4.8/5
(35)

Employers can use firewalls to restrict employees' access to sensitive data.

(True/False)
4.9/5
(41)

A digital ______ is a notice that guarantees a user or website is legitimate.

(Short Answer)
4.8/5
(39)

Badges, cards, smart cards, and keys are examples of _____ objects.

(Multiple Choice)
4.9/5
(38)

You should disable GPS tracking on your mobile device unless you need to use it.

(True/False)
4.8/5
(32)

Passcode is another term for a(n) ______.

(Multiple Choice)
4.8/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
In the encryption process, the encrypted (scrambled) data
digital security risk
In the encryption process, the unencrypted, readable data
clickjacking
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
script kiddie
Correct Answer:
Verified
Premises:
Responses:
In the encryption process, the encrypted (scrambled) data
digital security risk
In the encryption process, the unencrypted, readable data
clickjacking
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
script kiddie
Protects a network's resources from intrusion
bot
Hacker who usually does not have advanced computer and technical skills
digital signature
A group of compromised computers
piracy
The unauthorized and illegal duplication of copyrighted software
ciphertext
Any event or action that could cause a loss of or damage to computer or mobile device hardware
CA
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
firewall
A notice that guarantees a user or a website is legitimate
digital certificate
A program that performs a repetitive task on a network
zombie
An authorized person or company that issues and verifies digital certificates
DoS attack
An assault whose purpose is to disrupt computer access to an Internet service
plaintext
Outlines the activities for which a computer or network may and may not be used
AUP
A scam in which a button or link on a website contains a malicious program
botnet
(Matching)
4.8/5
(40)

COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?

(Multiple Choice)
4.9/5
(40)

A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.

(Short Answer)
4.8/5
(27)

PIN stands for personal identification ______.

(Multiple Choice)
4.8/5
(35)

Fingerprint readers are examples of ______ devices.

(Short Answer)
5.0/5
(31)

A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.

(Short Answer)
4.9/5
(38)

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

(Multiple Choice)
4.7/5
(39)

A(n) ______ was originally a complimentary work for a computer enthusiast.

(Multiple Choice)
4.9/5
(38)

Which of the following is NOT a part of a typical single-user license agreement?

(Multiple Choice)
4.8/5
(35)

User IDs are also called user names, log on names, or sign in names.

(True/False)
4.9/5
(36)

COGNITIVE ASSESSMENT An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?

(Multiple Choice)
4.7/5
(39)

Passphrases are less secure than passwords.

(True/False)
4.8/5
(35)

In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.

(Short Answer)
4.8/5
(33)

For what purpose was the BSA formed?

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)