Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe botnets and denial of service attacks.

(Essay)
4.7/5
(34)

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

(True/False)
4.9/5
(39)

____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

(Short Answer)
4.7/5
(29)

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

(True/False)
5.0/5
(34)

Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?

(Multiple Choice)
4.8/5
(40)

Many businesses use which of the following to limit employees' web access?

(Multiple Choice)
5.0/5
(35)

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

(Multiple Choice)
4.8/5
(35)

Discuss the measures you can take to safeguard home computers and devices.

(Essay)
4.8/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A group of compromised computers.
Responses:
firewall
zombie
web filtering software
Correct Answer:
Verified
Premises:
Responses:
A group of compromised computers.
firewall
(Matching)
4.9/5
(33)

Any illegal act involving a computer generally is referred to as a computer crime.

(True/False)
4.9/5
(32)

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

(Multiple Choice)
4.8/5
(33)

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

(Multiple Choice)
4.8/5
(35)

A(n) ____________________ agreement is the right to use software.

(Short Answer)
4.8/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A scam in which a button or link on a website contains a malicious program.
Responses:
password
CA
AUP
Correct Answer:
Verified
Premises:
Responses:
A scam in which a button or link on a website contains a malicious program.
password
(Matching)
4.7/5
(28)

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

(Multiple Choice)
4.7/5
(33)

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

(True/False)
4.7/5
(28)

During virtual browsing, your browser does not keep track of the websites you are visiting.

(True/False)
4.9/5
(31)

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

(Short Answer)
4.8/5
(32)

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.8/5
(29)

Which of the following best describes the term, cybercrime?

(Multiple Choice)
5.0/5
(34)
Showing 141 - 160 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)