Exam 5: Digital Security Ethics and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

back door

Biometric objects are entirely foolproof.

Free
(True/False)
4.9/5
(45)
Correct Answer:
Verified

False

Combating cybercrime is not one of the FBI's top priorities.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

What type of software restricts access to specified websites?

(Multiple Choice)
4.9/5
(37)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

(Short Answer)
4.9/5
(32)

Any illegal act involving a computer generally is referred to as a computer crime.

(True/False)
4.9/5
(31)

PINs are not the same as passwords.

(True/False)
4.9/5
(31)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.9/5
(38)

Any device that connects to the Internet is susceptible to mobile malware.

(True/False)
4.8/5
(36)

What is an AUP intended to do?

(Multiple Choice)
4.8/5
(36)

  Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

(Multiple Choice)
4.9/5
(41)

The term, zombie, is _____________.

(Multiple Choice)
4.9/5
(40)

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

(Multiple Choice)
4.8/5
(37)

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

(True/False)
5.0/5
(34)

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

(True/False)
4.8/5
(24)

Which of the following does your new smartphone use to unlock the device?

(Multiple Choice)
4.8/5
(38)

A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

(Short Answer)
4.8/5
(36)

Which of the following categories are the rights to which creators are entitled for their work?

(Multiple Choice)
4.7/5
(25)

A rootkit can be a back door.

(True/False)
4.8/5
(34)

Which of the following is not a security product developer?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)