Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology200 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 6: Internet Services, Devices, and Software140 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An assault whose purpose is to disrupt computer access to an Internet service
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
ciphertext
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(32)
Which of the following can be used to create a software registration number, sometimes illegally?
(Multiple Choice)
4.9/5
(30)
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
(Multiple Choice)
4.9/5
(30)
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
(True/False)
4.8/5
(33)
With a three-generation backup policy, the grandparent is which of the following?
(Multiple Choice)
4.8/5
(44)
What is the term for a program that performs a repetitive task on a network?
(Multiple Choice)
4.9/5
(35)
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
(Multiple Choice)
4.7/5
(33)
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
(Short Answer)
4.9/5
(34)
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
(Multiple Choice)
4.9/5
(37)
Which of the following statements is not true about biometric devices?
(Multiple Choice)
4.9/5
(34)
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
(True/False)
4.9/5
(35)
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
(Multiple Choice)
4.8/5
(32)
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
(Multiple Choice)
4.8/5
(43)
If you are nervous, a signature might not match the one on file in a signature verification system.
(True/False)
4.8/5
(37)
Which of the following is the process of restricting access to certain material on the web?
(Multiple Choice)
4.8/5
(35)
One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
(True/False)
4.8/5
(43)
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.7/5
(47)
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
(Multiple Choice)
4.8/5
(33)
Showing 61 - 80 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)