Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering Computers
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?
Question 82
Short Answer
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
Question 83
Multiple Choice
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
Question 84
True/False
During virtual browsing, your browser does not keep track of the websites you are visiting.
Question 85
Multiple Choice
COGNITIVE ASSESSMENT What happens during a DDoS attack?
Question 86
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
Question 87
True/False
As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
Question 88
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?