Exam 5: Digital Safety and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

Free
(True/False)
4.8/5
(46)
Correct Answer:
Verified

True

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

back door

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Short Answer)
4.9/5
(35)

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.9/5
(49)

COGNITIVE ASSESSMENT What happens during a DDoS attack?

(Multiple Choice)
5.0/5
(37)

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

(True/False)
4.7/5
(30)

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

(Multiple Choice)
4.9/5
(41)

COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

(Multiple Choice)
4.8/5
(35)

Programmers often build trapdoors into programs during system development.

(True/False)
4.8/5
(32)

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

(Multiple Choice)
4.9/5
(36)

COGNITIVE ASSESSMENT Which of the following does a new federal laboratory use in its high security areas?

(Multiple Choice)
4.9/5
(30)

COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

(Multiple Choice)
4.9/5
(37)

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

(Short Answer)
4.9/5
(33)

What is the term for a program that performs a repetitive task on a network?

(Multiple Choice)
4.9/5
(33)

Secure sites typically use digital certificates along with security protocols.

(True/False)
4.8/5
(36)

How much do fingerprint readers typically cost?

(Multiple Choice)
4.8/5
(39)

If a company does not have a formal email policy, it can read email messages without employee notification.

(True/False)
4.8/5
(32)

Discuss the measures you can take to safeguard home computers and devices.

(Essay)
5.0/5
(30)

Many businesses use which of the following to limit employees' web access?

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)