Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An assault whose purpose is to disrupt computer access to an Internet service
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
ciphertext
Correct Answer:
Verified
Premises:
Responses:
An assault whose purpose is to disrupt computer access to an Internet service
clickjacking
(Matching)
4.9/5
(32)

Which of the following can be used to create a software registration number, sometimes illegally?

(Multiple Choice)
4.9/5
(30)

In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?

(Multiple Choice)
4.9/5
(30)

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

(True/False)
4.8/5
(33)

With a three-generation backup policy, the grandparent is which of the following?

(Multiple Choice)
4.8/5
(44)

What is the term for a program that performs a repetitive task on a network?

(Multiple Choice)
4.9/5
(35)

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

(Multiple Choice)
4.7/5
(33)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

(Short Answer)
4.9/5
(34)

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

(Multiple Choice)
4.9/5
(37)

Which of the following statements is not true about biometric devices?

(Multiple Choice)
4.9/5
(34)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.9/5
(35)

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

(Multiple Choice)
4.8/5
(32)

The term, PIN, is an acronym for which of the following?

(Multiple Choice)
4.8/5
(25)

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

(Multiple Choice)
4.8/5
(43)

If you are nervous, a signature might not match the one on file in a signature verification system.

(True/False)
4.8/5
(37)

The term, zombie, is _____________.

(Multiple Choice)
4.8/5
(32)

Which of the following is the process of restricting access to certain material on the web?

(Multiple Choice)
4.8/5
(35)

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

(True/False)
4.8/5
(43)

  Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure. Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.7/5
(47)

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.8/5
(33)
Showing 61 - 80 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)