Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a company does not have a formal email policy, it can read email messages without employee notification.

(True/False)
4.8/5
(33)

Audit trails only record unsuccessful access attempts.

(True/False)
4.9/5
(33)

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

(Multiple Choice)
4.9/5
(30)

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

(Multiple Choice)
4.9/5
(38)

Which of the following statements is not true about software theft?

(Multiple Choice)
4.7/5
(34)

Which of the following terms is used to describe a small text file that a web server stores on your computer?

(Multiple Choice)
4.9/5
(30)

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

(True/False)
4.8/5
(38)

What is the term for a website that uses encryption techniques to protect its data?

(Multiple Choice)
4.7/5
(33)

Which of the following terms refers to making a copy of a file?

(Multiple Choice)
4.8/5
(40)

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

(Multiple Choice)
4.9/5
(36)

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

(True/False)
4.8/5
(32)

Both Windows and Mac operating systems include firewall capabilities.

(True/False)
4.8/5
(32)

Which of the following copies all of the files in a computer?

(Multiple Choice)
4.8/5
(40)

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Short Answer)
4.7/5
(38)

Discuss the four types of software theft.

(Essay)
4.8/5
(45)

It is illegal for employers to use software programs that monitor employees.

(True/False)
4.8/5
(31)

The term CAPTCHA is _____________.

(Multiple Choice)
4.9/5
(34)

____________________ occurs when someone steals personal or confidential information.

(Short Answer)
4.7/5
(43)

Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

(Essay)
4.9/5
(36)

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

(True/False)
4.8/5
(35)
Showing 161 - 180 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)