Filters
Question type

Study Flashcards

User IDs are also called user names, log on names, or sign in names.

Correct Answer

verifed

verified

Which of the following is NOT a part of a typical single-user license agreement?


A) You can make one copy of the software as a backup.
B) You can rent or lease the software.
C) You cannot install the software on a network.
D) You cannot export the software.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?


A) Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
B) The company storing the data must protect against data loss due to physical disasters.
C) When transferring data over a network to the cloud, the data should be encrypted and authenticated.
D) Cloud storage companies have increased their privacy and security features in recent years.

Correct Answer

verifed

verified

In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.

Correct Answer

verifed

verified

Passphrases are less secure than passwords.

Correct Answer

verifed

verified

A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform) ?


A) emergency plan
B) recovery plan
C) restoration plan
D) building plan

Correct Answer

verifed

verified

You should disable GPS tracking on your mobile device unless you need to use it.

Correct Answer

verifed

verified

For what purpose was the BSA formed?


A) To promote understanding of software piracy.
B) To fight against hacktivists.
C) To create an online resource for malware protection.
D) To enforce laws against cyberterrorists.

Correct Answer

verifed

verified

A(n) ______ was originally a complimentary work for a computer enthusiast.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

Badges, cards, smart cards, and keys are examples of _____ objects.


A) wearable
B) carried
C) possessed
D) pocket

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
In the encryption process, the encrypted (scrambled) data
In the encryption process, the unencrypted, readable data
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Protects a network's resources from intrusion
Hacker who usually does not have advanced computer and technical skills
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
Any event or action that could cause a loss of or damage to computer or mobile device hardware
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
A notice that guarantees a user or a website is legitimate
A program that performs a repetitive task on a network
An authorized person or company that issues and verifies digital certificates
An assault whose purpose is to disrupt computer access to an Internet service
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program
Responses
digital security risk
clickjacking
script kiddie
bot
digital signature
piracy
ciphertext
CA
firewall
digital certificate
zombie
DoS attack
plaintext
AUP
botnet

Correct Answer

In the encryption process, the encrypted (scrambled) data
In the encryption process, the unencrypted, readable data
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Protects a network's resources from intrusion
Hacker who usually does not have advanced computer and technical skills
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
Any event or action that could cause a loss of or damage to computer or mobile device hardware
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
A notice that guarantees a user or a website is legitimate
A program that performs a repetitive task on a network
An authorized person or company that issues and verifies digital certificates
An assault whose purpose is to disrupt computer access to an Internet service
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program

PIN stands for personal identification ______.


A) number
B) name
C) network
D) note

Correct Answer

verifed

verified

A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.

Correct Answer

verifed

verified

passphrase...

View Answer

Passcode is another term for a(n) ______.


A) user name
B) encryption algorithm
C) passphrase
D) PIN

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is NOT true about CAPTCHAs?


A) A CAPTCHA is an image containing a series of distorted characters.
B) CAPTCHAs were developed to verify input is coming from computer programs, not humans.
C) The CAPTCHA text can be read aloud for visually impaired users.
D) You have the option of generating a new CAPTCHA.

Correct Answer

verifed

verified

Fingerprint readers are examples of ______ devices.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?


A) Avoid games requiring passwords to be saved to an online account on a smartphone.
B) Look for games that use ActiveX or JavaScript, as these are always safe.
C) Check the developer of any software or apps to be certain it is legitimate.
D) Use a firewall when using multiplayer online games.

Correct Answer

verifed

verified

A digital ______ is a notice that guarantees a user or website is legitimate.

Correct Answer

verifed

verified

Employers can use firewalls to restrict employees' access to sensitive data.

Correct Answer

verifed

verified

Showing 41 - 60 of 86

Related Exams

Show Answer