Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology200 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 6: Internet Services, Devices, and Software140 Questions
Select questions type
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
(True/False)
4.9/5
(39)
____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.
(Short Answer)
4.7/5
(29)
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
(True/False)
5.0/5
(34)
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
(Multiple Choice)
4.8/5
(40)
Many businesses use which of the following to limit employees' web access?
(Multiple Choice)
5.0/5
(35)
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
(Multiple Choice)
4.8/5
(35)
Discuss the measures you can take to safeguard home computers and devices.
(Essay)
4.8/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A group of compromised computers.
Responses:
firewall
zombie
web filtering software
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
Any illegal act involving a computer generally is referred to as a computer crime.
(True/False)
4.9/5
(32)
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
(Multiple Choice)
4.8/5
(33)
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
(Multiple Choice)
4.8/5
(35)
A(n) ____________________ agreement is the right to use software.
(Short Answer)
4.8/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A scam in which a button or link on a website contains a malicious program.
Responses:
password
CA
AUP
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(28)
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
(Multiple Choice)
4.7/5
(33)
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
(True/False)
4.7/5
(28)
During virtual browsing, your browser does not keep track of the websites you are visiting.
(True/False)
4.9/5
(31)
A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
(Short Answer)
4.8/5
(32)
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
(Multiple Choice)
4.8/5
(29)
Which of the following best describes the term, cybercrime?
(Multiple Choice)
5.0/5
(34)
Showing 141 - 160 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)