Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology200 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 6: Internet Services, Devices, and Software140 Questions
Select questions type
If a company does not have a formal email policy, it can read email messages without employee notification.
(True/False)
4.8/5
(33)
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
(Multiple Choice)
4.9/5
(30)
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
(Multiple Choice)
4.9/5
(38)
Which of the following statements is not true about software theft?
(Multiple Choice)
4.7/5
(34)
Which of the following terms is used to describe a small text file that a web server stores on your computer?
(Multiple Choice)
4.9/5
(30)
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
(True/False)
4.8/5
(38)
What is the term for a website that uses encryption techniques to protect its data?
(Multiple Choice)
4.7/5
(33)
Which of the following terms refers to making a copy of a file?
(Multiple Choice)
4.8/5
(40)
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
(Multiple Choice)
4.9/5
(36)
Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
(True/False)
4.8/5
(32)
Both Windows and Mac operating systems include firewall capabilities.
(True/False)
4.8/5
(32)
Which of the following copies all of the files in a computer?
(Multiple Choice)
4.8/5
(40)
The most common type of license included with software purchased by individual users is a(n) ____________________.
(Short Answer)
4.7/5
(38)
It is illegal for employers to use software programs that monitor employees.
(True/False)
4.8/5
(31)
____________________ occurs when someone steals personal or confidential information.
(Short Answer)
4.7/5
(43)
Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware
(Essay)
4.9/5
(36)
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
(True/False)
4.8/5
(35)
Showing 161 - 180 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)