Exam 31: Security, Privacy, and Ethics Online
Exam 1: Computers and Computer Systems46 Questions
Exam 2: Input, Output and Processing46 Questions
Exam 3: Computer Protection46 Questions
Exam 4: Computer Maintenance46 Questions
Exam 5: Computer-Related Issues46 Questions
Exam 6: Software and Hardware Interaction46 Questions
Exam 7: Software Fundamentals46 Questions
Exam 8: Operating Systems46 Questions
Exam 9: Windows Management46 Questions
Exam 10: Operating System Customization46 Questions
Exam 11: Exploring Microsoft Office 201046 Questions
Exam 12: Getting Started With Word Essentials46 Questions
Exam 13: Editing and Formatting Documents46 Questions
Exam 14: Sharing Documents46 Questions
Exam 15: Working With Tables46 Questions
Exam 16: Using Templates, Styles, and Building Blocks46 Questions
Exam 17: Enhancing Documents46 Questions
Exam 18: Getting Started With Excel Essentials46 Questions
Exam 19: Organizing and Enhancing Worksheets46 Questions
Exam 20: Creating Formulas and Charting Data46 Questions
Exam 21: Getting Started With Powerpoint Essentials46 Questions
Exam 22: Enhancing Presentations With Multimedia Effects46 Questions
Exam 23: Getting Started With Access Essentials46 Questions
Exam 24: Managing and Reporting Database Information46 Questions
Exam 25: Networks Fundamentals46 Questions
Exam 26: Communication Services46 Questions
Exam 27: Communications and Collaboration46 Questions
Exam 28: Using the Internet and the World Wide Web46 Questions
Exam 29: Web Content46 Questions
Exam 30: Technology and Society31 Questions
Exam 31: Security, Privacy, and Ethics Online46 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A certificate for sites that process sensitive data.
Responses:
FTC
Firewall
TLS
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.8/5
(34)
Correct Answer:
Which of the following is NOT a guideline for using network protection?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
Generally, any information gathered from a company's computer system is company property and not an individual worker's personal property.
Free
(True/False)
5.0/5
(25)
Correct Answer:
True
Typical phishing messages come from social networking sites, auction sites, banks, and the IRS.
(True/False)
4.9/5
(32)
Joanna is a responsible and secure computer user. Joanna knows that all of the following are TRUE about securing data, EXCEPT: ____.
(Multiple Choice)
4.8/5
(41)
A(n) ____ is a malicious program that records your keystrokes to keep track of the information such as credit card and account numbers.
(Multiple Choice)
4.8/5
(40)
You should store your backup files near the computer so they will be accessible in case your hard drive fails.
(True/False)
4.8/5
(39)
When using a notebook computer, put it on your lap for stability.
(True/False)
4.7/5
(37)
A(n) ____________________ can be used to provide the Web site owner with information about you and your computer.
(Short Answer)
4.7/5
(31)
____ attacks use a script or program to log on to an account using hundreds of words or phrases stored in a file.
(Multiple Choice)
4.8/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A network security feature.
Responses:
Firewall
TLS
FTC
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(28)
A(n) ____ is usually a battery that provides power if the normal current is disrupted.
(Multiple Choice)
4.8/5
(27)
Unauthorized use of an unsecured wireless network can slow down your Internet access.
(True/False)
4.8/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An agency that offers guidelines to make sure your e-commerce transactions are secure.
Responses:
Firewall
FTC
Private key
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
What effect can an unexpected power outage have on your data? What to most software programs do to prevent data loss? List two things you can use to safeguard computer systems against power outages. What does backing up entail? What priority should your backup procedure have?
(Essay)
4.9/5
(34)
A software firewall is more secure and easier to monitor for large networks.
(True/False)
4.7/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Decrypts information.
Responses:
Public key
Private key
Firewall
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(46)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)