Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Secure sites typically use digital certificates along with security protocols.

(True/False)
4.9/5
(25)

What is an EULA intended to do?

(Multiple Choice)
4.7/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Outlines the activities for which a computer or network may and may not be used.
Responses:
firewall
clickjacking
AUP
Correct Answer:
Verified
Premises:
Responses:
Outlines the activities for which a computer or network may and may not be used.
firewall
(Matching)
4.9/5
(26)

The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

(Short Answer)
4.9/5
(26)

  The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure. The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

(True/False)
4.8/5
(36)

Which encryption algorithm inserts characters between existing characters?

(Multiple Choice)
4.8/5
(34)

Which of the following does your new smartphone use to unlock the device?

(Multiple Choice)
4.9/5
(31)

Many businesses use spyware to limit employees' web access.

(True/False)
4.7/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
Responses:
bot
Digital Millennium Copyright Act (DCMA)
clickjacking
Correct Answer:
Verified
Premises:
Responses:
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
bot
(Matching)
4.9/5
(37)

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

(Multiple Choice)
4.8/5
(28)

Which of the following statements is not a safeguard against the failure of hardware?

(Multiple Choice)
4.9/5
(39)

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

(True/False)
4.9/5
(25)

What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
4.8/5
(31)

COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

(True/False)
4.8/5
(33)

Which of the following statements is not true about Internet and network attacks?

(Multiple Choice)
4.8/5
(32)

Which of the following terms means in a location separate from the computer site?

(Multiple Choice)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects any tangible form of expression.
Responses:
firewall
ciphertext
piracy
Correct Answer:
Verified
Premises:
Responses:
Protects any tangible form of expression.
firewall
(Matching)
4.9/5
(27)

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

(Short Answer)
4.7/5
(37)

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

(Multiple Choice)
4.8/5
(43)

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

(Short Answer)
4.8/5
(34)
Showing 101 - 120 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)