Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that restricts access to specified websites.
Responses:
ciphertext
firewall
piracy
Correct Answer:
Verified
Premises:
Responses:
A program that restricts access to specified websites.
ciphertext
Free
(Matching)
4.7/5
(37)
Correct Answer:
Verified

HIPAA protects individuals against the wrongful disclosure of their health information.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

(True/False)
4.8/5
(39)

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

(True/False)
4.8/5
(32)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Responses:
script kiddie
password
bot
Correct Answer:
Verified
Premises:
Responses:
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
script kiddie
(Matching)
4.8/5
(44)

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

(Short Answer)
5.0/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Responses:
digital certificate
script kiddie
DoS attack
Correct Answer:
Verified
Premises:
Responses:
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
digital certificate
(Matching)
4.7/5
(31)

The term firewall is _____________.

(Multiple Choice)
4.8/5
(41)

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

(Multiple Choice)
4.7/5
(31)

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

(Multiple Choice)
4.9/5
(35)

Which of the following is a federally funded Internet security research and development center?

(Multiple Choice)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Biometric device used in high security areas.
Responses:
clickjacking
plaintext
digital certificate
Correct Answer:
Verified
Premises:
Responses:
Biometric device used in high security areas.
clickjacking
(Matching)
4.9/5
(28)

Your browsing history is a list of all websites you have visited over a period of time.

(True/False)
4.9/5
(37)

The term back door, as it refers to computer crime, is _____________.

(Multiple Choice)
4.8/5
(36)

Any device that connects to the Internet is susceptible to mobile malware.

(True/False)
4.9/5
(31)

Analog signatures help to prevent email forgery.

(True/False)
4.8/5
(33)

Which of the following is not a possessed object?

(Multiple Choice)
5.0/5
(31)

Which of the following is an authorized person or company that issues and verifies digital certificates?

(Multiple Choice)
4.8/5
(36)

Programmers often build trapdoors into programs during system development.

(True/False)
4.7/5
(42)
Showing 1 - 20 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)