Filters
Question type

Study Flashcards

Identify the letter of the choice that best matches the phrase or definition. -Any event or action that could cause a loss of or damage to computer or mobile device hardware.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) E) and F)
V) K) and Q)

Correct Answer

verifed

verified

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Correct Answer

verifed

verified

  -Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program. -Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

Correct Answer

verifed

verified

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -Makes it illegal to circumvent antipiracy schemes in commercial software.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) B) and E)
V) G) and S)

Correct Answer

verifed

verified

Which of the following is an authorized person or company that issues and verifies digital certificates?


A) certificate authority
B) certificate agency
C) certificate office
D) certificate bureau

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following does your company use to track your time and attendance?


A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following does your financial institution use to reduce fraud?


A) digital forensics system
B) iris recognition system
C) signature verification system
D) hand geometry system

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

How long can digital certificates be valid?


A) six months
B) two years
C) four years
D) five years

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

  -One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? A) 25 B) 35 C) 55 D) 75 -One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?


A) 25
B) 35
C) 55
D) 75

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Internet advertising firms often use which of the following to collect information about users web browsing habits?


A) comware
B) postware
C) spyware
D) billware

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

____________________ is the unauthorized and illegal duplication of copyrighted software.

Correct Answer

verifed

verified

Software p...

View Answer

  -A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks. -A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

Correct Answer

verifed

verified

SSID
service set ide...

View Answer

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

Correct Answer

verifed

verified

Case 5-2 ​ In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. -Which of the following is NOT a question of technology ethics?


A) Users are required to provide a software product's 25-character identification number before installing software.
B) A student copies text from the web and uses it in a research paper for his English class.
C) A student who has been expelled from school installs a computer virus on a computer in the student lab.
D) Someone copies The DaVinci Code to the web and encourages others to read it.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -Outlines the activities for which a computer or network may and may not be used.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) L) and P)
V) F) and S)

Correct Answer

verifed

verified

Which of the following does your new smartphone use to unlock the device?


A) hand geometry system
B) face recognition system
C) iris recognition system
D) digital forensics system

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

Correct Answer

verifed

verified

denial of service
Do...

View Answer

What is an AUP intended to do?


A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 161 - 180 of 197

Related Exams

Show Answer