Filters
Question type

Study Flashcards

A rootkit can be a back door.

A) True
B) False

Correct Answer

verifed

verified

Discuss the four types of software theft.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
Usually does not have advanced computer and technical skills.
Responses
Digital Millennium Copyright Act (DCMA)
CA
iris recognition system
copyright
digital signature
clickjacking
firewall
bot
digital certificate
botnet
ciphertext
password
piracy
web filtering software
plaintext
AUP
script kiddie
DoS attack
digital security risk
zombie

Correct Answer

Digital Millennium Copyright Act (DCMA)
CA
iris recognition system
copyright
digital signature
clickjacking
firewall
bot
digital certificate
botnet
ciphertext
password
piracy
web filtering software
plaintext
AUP
script kiddie
DoS attack
digital security risk
zombie

A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

Correct Answer

verifed

verified

online sec...

View Answer

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

A) True
B) False

Correct Answer

verifed

verified

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

Correct Answer

verifed

verified

HIPAA protects individuals against the wrongful disclosure of their health information.

A) True
B) False

Correct Answer

verifed

verified

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

A) True
B) False

Correct Answer

verifed

verified

____________________ is the unauthorized and illegal duplication of copyrighted software.

Correct Answer

verifed

verified

The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

Correct Answer

verifed

verified

COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

A) True
B) False

Correct Answer

verifed

verified

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?


A) malware
B) untrusted sources
C) threats
D) cybermalls

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy.Because this has historically been rather easy to do, the practice has become very common.As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.Which of the following is NOT permissible under a single-user license agreement?


A) Jamie installs Quark Xpress on a single computer.
B) Christine leases her copy of Dreamweaver.
C) Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
D) Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
A common infringement of copyright.
Responses
ciphertext
web filtering software
digital security risk
iris recognition system
script kiddie
clickjacking
firewall
CA
AUP
digital certificate
password
digital signature
Digital Millennium Copyright Act (DCMA)
DoS attack
botnet
plaintext
copyright
bot
piracy
zombie

Correct Answer

ciphertext
web filtering software
digital security risk
iris recognition system
script kiddie
clickjacking
firewall
CA
AUP
digital certificate
password
digital signature
Digital Millennium Copyright Act (DCMA)
DoS attack
botnet
plaintext
copyright
bot
piracy
zombie

COGNITIVE ASSESSMENT Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?


A) digital forensics system
B) voice verification system
C) iris recognition system
D) hand geometry system

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is an authorized person or company that issues and verifies digital certificates?


A) certificate authority
B) certificate agency
C) certificate office
D) certificate bureau

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

    The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure. The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

A) True
B) False

Correct Answer

verifed

verified

    Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program. Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

Correct Answer

verifed

verified

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 200

Related Exams

Show Answer