Exam 5: Digital Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the process of restricting access to certain material on the web?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

In order to safeguard your personal information, which of the following is recommended?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

A(n) ____________________ agreement is the right to use software.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

license

What is the term for a website that uses encryption techniques to protect its data?

(Multiple Choice)
4.8/5
(37)

Which of the following is the least likely motive for a DDoS?

(Multiple Choice)
4.9/5
(33)

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

(Multiple Choice)
4.9/5
(35)

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

(Multiple Choice)
4.9/5
(40)

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

(True/False)
4.9/5
(33)

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -A program that performs a repetitive task on a network.

(Short Answer)
4.9/5
(43)

In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. ​ Which of the following is NOT a question of technology ethics? In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. ​ Which of the following is NOT a question of technology ethics?

(Short Answer)
4.9/5
(36)

Which term is used to describe software used by cybercriminals?

(Multiple Choice)
4.8/5
(30)

​ According to some estimates, ____ mobile phones are lost or stolen in the United States every minute.

(Multiple Choice)
4.7/5
(35)

Internet advertising firms often use which of the following to collect information about users web browsing habits?

(Multiple Choice)
4.7/5
(34)

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

(True/False)
4.9/5
(40)

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

(True/False)
4.8/5
(32)

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

(Multiple Choice)
4.8/5
(36)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.8/5
(30)

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

(Essay)
4.8/5
(40)

​ What type of software restricts access to specified websites?

(Multiple Choice)
4.9/5
(35)

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Essay)
4.9/5
(35)
Showing 1 - 20 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)