Exam 5: Digital Security Ethics and Privacy
Exam 1: Introducing Today S Technologies199 Questions
Exam 2: Connecting and Communicating Online200 Questions
Exam 3: Computers and Mobile Devices200 Questions
Exam 4: Programs and Apps200 Questions
Exam 5: Digital Security Ethics and Privacy200 Questions
Exam 6: Computing Components200 Questions
Exam 7: Input and Output200 Questions
Exam 8: Digital Storage197 Questions
Exam 9: Operating Systems200 Questions
Exam 10: Communicating Digital Content200 Questions
Exam 11: Building Solutions199 Questions
Exam 12: Working in the Enterprise200 Questions
Exam 13: Focus on Web Development74 Questions
Exam 14: Practice Test for Mindtap9 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Outlines the activities for which a computer or network may and may not be used.
Responses:
botnet
Digital Millennium Copyright Act (DCMA)
zombie
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.8/5
(41)
Correct Answer:
COGNITIVE ASSESSMENT What happens during a DDoS attack?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
Which of the following is the process of restricting access to certain material on the web?
Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
B
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
(True/False)
4.9/5
(35)
If you are nervous, a signature might not match the one on file in a signature verification system.
(True/False)
4.9/5
(32)
COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?
(Multiple Choice)
4.9/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Most systems require that a user selects this on his or her own.
Responses:
AUP
CA
firewall
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware
(Essay)
4.8/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A notice that guarantees a user or a website is legitimate.
Responses:
digital signature
web filtering software
digital security risk
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
(Multiple Choice)
4.8/5
(29)
Which of the following is a federally funded Internet security research and development center?
(Multiple Choice)
4.9/5
(35)
COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?
(Multiple Choice)
4.7/5
(35)
Perpetrators of back doors trick their victims into interacting with phony websites.
(True/False)
4.8/5
(38)
A(n)____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

(Short Answer)
4.9/5
(32)
COGNITIVE ASSESSMENT
____ apps can allow you to lock your mobile device and SIM card remotely.
(Multiple Choice)
4.9/5
(40)
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
(True/False)
4.8/5
(36)
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
(Multiple Choice)
4.7/5
(31)
Your browsing history is a list of all websites you have visited over a period of time.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)