Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology200 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 6: Internet Services, Devices, and Software140 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that restricts access to specified websites.
Responses:
ciphertext
firewall
piracy
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.7/5
(37)
Correct Answer:
HIPAA protects individuals against the wrongful disclosure of their health information.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
(True/False)
4.8/5
(39)
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
(True/False)
4.8/5
(32)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Responses:
script kiddie
password
bot
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(44)
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
(Short Answer)
5.0/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Responses:
digital certificate
script kiddie
DoS attack
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(31)
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
(Multiple Choice)
4.7/5
(31)
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
(Multiple Choice)
4.9/5
(35)
Which of the following is a federally funded Internet security research and development center?
(Multiple Choice)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Biometric device used in high security areas.
Responses:
clickjacking
plaintext
digital certificate
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(28)
Your browsing history is a list of all websites you have visited over a period of time.
(True/False)
4.9/5
(37)
The term back door, as it refers to computer crime, is _____________.
(Multiple Choice)
4.8/5
(36)
Any device that connects to the Internet is susceptible to mobile malware.
(True/False)
4.9/5
(31)
Which of the following is an authorized person or company that issues and verifies digital certificates?
(Multiple Choice)
4.8/5
(36)
Programmers often build trapdoors into programs during system development.
(True/False)
4.7/5
(42)
Showing 1 - 20 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)