Exam 5: Digital Safety and Security
Exam 1: Digital Literacy181 Questions
Exam 2: The Internet181 Questions
Exam 3: Computers and Mobile Devices181 Questions
Exam 4: Programs and Apps181 Questions
Exam 5: Digital Safety and Security181 Questions
Exam 6: Inside Computers and Mobile Devices181 Questions
Exam 7: Input and Output181 Questions
Exam 8: Digital Storage181 Questions
Exam 9: Operating Systems181 Questions
Exam 10: Communications and Networks181 Questions
Exam 11: Information and Data Management181 Questions
Exam 12: Information Systems and Program Development181 Questions
Exam 13: Appendix: Discovering Computers179 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
Free
(True/False)
4.8/5
(46)
Correct Answer:
True
A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
back door
The most common type of license included with software purchased by individual users is a(n) ____________________.
(Short Answer)
4.9/5
(35)
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
(Multiple Choice)
4.9/5
(49)
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
(True/False)
4.7/5
(30)
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
(Multiple Choice)
4.9/5
(41)
COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
(Multiple Choice)
4.8/5
(35)
Programmers often build trapdoors into programs during system development.
(True/False)
4.8/5
(32)
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
(Multiple Choice)
4.9/5
(36)
COGNITIVE ASSESSMENT Which of the following does a new federal laboratory use in its high security areas?
(Multiple Choice)
4.9/5
(30)
COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
(Multiple Choice)
4.9/5
(37)
Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.
(Short Answer)
4.9/5
(33)
What is the term for a program that performs a repetitive task on a network?
(Multiple Choice)
4.9/5
(33)
Secure sites typically use digital certificates along with security protocols.
(True/False)
4.8/5
(36)
If a company does not have a formal email policy, it can read email messages without employee notification.
(True/False)
4.8/5
(32)
Discuss the measures you can take to safeguard home computers and devices.
(Essay)
5.0/5
(30)
Many businesses use which of the following to limit employees' web access?
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)