Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology200 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 6: Internet Services, Devices, and Software140 Questions
Select questions type
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?

(Multiple Choice)
4.7/5
(32)
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
(Multiple Choice)
4.7/5
(34)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that performs a repetitive task on a network.
Responses:
script kiddie
plaintext
CA
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
(Multiple Choice)
4.9/5
(33)
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
(Multiple Choice)
4.8/5
(36)
Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
(True/False)
4.8/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the unencrypted, readable data.
Responses:
iris recognition system
AUP
digital certificate
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(40)
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
(Multiple Choice)
4.9/5
(30)
If a program or device has a default password, be sure to retain it.
(True/False)
4.8/5
(35)
A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
(Short Answer)
4.7/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the encrypted (scrambled) data.
Responses:
copyright
script kiddie
bot
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
Which of the following statements is not true about intellectual property rights?
(Multiple Choice)
4.8/5
(28)
Which of the following does a new federal laboratory use in its high security areas?
(Multiple Choice)
4.9/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects a network's resources from intrusion.
Responses:
iris recognition system
digital signature
digital certificate
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(32)
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
(Multiple Choice)
4.7/5
(27)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Most systems require that a user selects this on his or her own.
Responses:
CA
digital certificate
zombie
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(35)
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
(Multiple Choice)
4.8/5
(31)
Websites use which of the following to keep track of items in a user's shopping cart?
(Multiple Choice)
4.7/5
(28)
Showing 81 - 100 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)