Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following does your financial institution use to reduce fraud?

(Multiple Choice)
4.9/5
(36)

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

(Short Answer)
4.8/5
(32)

Which of the following statements is not true about backing up?

(Multiple Choice)
4.8/5
(26)

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

(Multiple Choice)
4.8/5
(37)

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

(Multiple Choice)
4.8/5
(32)

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

(Multiple Choice)
4.8/5
(40)

To remove spyware, users need to obtain a special program that can detect and delete it.

(True/False)
4.8/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A common infringement of copyright.
Responses:
digital certificate
iris recognition system
web filtering software
Correct Answer:
Verified
Premises:
Responses:
A common infringement of copyright.
digital certificate
(Matching)
4.8/5
(39)

A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

(Multiple Choice)
4.8/5
(30)

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

(Multiple Choice)
4.8/5
(40)

What happens during a DDoS attack?

(Multiple Choice)
4.7/5
(33)

____________________ is the unauthorized and illegal duplication of copyrighted software.

(Short Answer)
4.9/5
(25)

What is an AUP intended to do?

(Multiple Choice)
4.8/5
(39)

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.Which of the following is NOT a question of computer ethics?

(Multiple Choice)
4.9/5
(40)

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

(Multiple Choice)
4.9/5
(36)

Combating cybercrime is not one of the FBI's top priorities.

(True/False)
4.7/5
(29)

  As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

(True/False)
5.0/5
(30)

What is another name for public key encryption?

(Multiple Choice)
4.7/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A notice that guarantees a user or a website is legitimate.
Responses:
web filtering software
digital signature
DoS attack
Correct Answer:
Verified
Premises:
Responses:
A notice that guarantees a user or a website is legitimate.
web filtering software
(Matching)
4.8/5
(34)

How much do fingerprint readers typically cost?

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)