Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ______ often uses prewritten hacking and cracking programs.

(Multiple Choice)
4.9/5
(33)

COGNITIVE ASSESSMENT You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

(Multiple Choice)
4.8/5
(26)

Software used to fight cybercriminals is called crimeware.

(True/False)
4.8/5
(33)

A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.

(True/False)
4.7/5
(39)

Describe and list advantages and disadvantages of each of the following backup types: full, differential, incremental, selective, CPD, and cloud.

(Essay)
4.8/5
(42)

The website for CERT/CC provides information about Internet security breaches.

(True/False)
4.8/5
(42)
Showing 81 - 86 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)