Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Public key encryption is also called asymmetric key encryption.

(True/False)
4.7/5
(42)

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

(Multiple Choice)
4.7/5
(33)

A rootkit can be a backdoor.

(True/False)
4.8/5
(44)

The term ______ refers to online or Internet-based illegal acts.

(Short Answer)
4.8/5
(39)

COGNITIVE ASSESSMENT Which of the following best describes a back door?

(Multiple Choice)
4.9/5
(39)

Two users can have the same email address.

(True/False)
4.9/5
(42)

List methods to protect computers, mobile devices, and networks from attacks.

(Essay)
4.9/5
(43)

Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

(True/False)
4.9/5
(34)

A password ______ is a service that stores all of your account information securely.

(Multiple Choice)
4.7/5
(48)

IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

(Short Answer)
4.8/5
(30)

Which of the following is not recommended to protect against hardware failure?

(Multiple Choice)
4.8/5
(43)

A(n) ______ has a goal of destroying data or stealing information.

(Multiple Choice)
4.8/5
(39)

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.

(Multiple Choice)
4.8/5
(39)

COGNITIVE ASSESSMENT Which of the following is NOT true about two-step verification?

(Multiple Choice)
4.8/5
(40)

A(n) ______ verification system compares a person's live speech with their stored speech pattern.

(Short Answer)
4.8/5
(32)

What is an audit trail?

(Multiple Choice)
4.9/5
(43)

To protect files on your device's hard drive from hackers, turn on file and printer sharing.

(True/False)
4.8/5
(38)

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.

(Multiple Choice)
4.8/5
(35)

What does a keygen do?

(Multiple Choice)
4.8/5
(38)

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

(Multiple Choice)
4.7/5
(40)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)