Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
Exam 1: Introducing Todays Technologies: Computers, Devices, and the Web86 Questions
Exam 2: Connecting and Communicating Online: the Internet, Websites, and Media86 Questions
Exam 3: Computers and Mobile Devices: Evaluating Options for Home and Work86 Questions
Exam 4: Programs and Apps: Productivity, Graphics, Security, and Other Tools86 Questions
Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses86 Questions
Exam 6: Appendix: Focus on Web Development42 Questions
Select questions type
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
(Multiple Choice)
4.7/5
(33)
The term ______ refers to online or Internet-based illegal acts.
(Short Answer)
4.8/5
(39)
COGNITIVE ASSESSMENT Which of the following best describes a back door?
(Multiple Choice)
4.9/5
(39)
List methods to protect computers, mobile devices, and networks from attacks.
(Essay)
4.9/5
(43)
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
(True/False)
4.9/5
(34)
A password ______ is a service that stores all of your account information securely.
(Multiple Choice)
4.7/5
(48)
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
(Short Answer)
4.8/5
(30)
Which of the following is not recommended to protect against hardware failure?
(Multiple Choice)
4.8/5
(43)
A(n) ______ has a goal of destroying data or stealing information.
(Multiple Choice)
4.8/5
(39)
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
(Multiple Choice)
4.8/5
(39)
COGNITIVE ASSESSMENT Which of the following is NOT true about two-step verification?
(Multiple Choice)
4.8/5
(40)
A(n) ______ verification system compares a person's live speech with their stored speech pattern.
(Short Answer)
4.8/5
(32)
To protect files on your device's hard drive from hackers, turn on file and printer sharing.
(True/False)
4.8/5
(38)
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
(Multiple Choice)
4.8/5
(35)
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
(Multiple Choice)
4.7/5
(40)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)