Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering Computers
Quiz 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
Question 102
True/False
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
Question 103
True/False
Audit trails only record unsuccessful access attempts.
Question 104
True/False
If you are nervous, a signature might not match the one on file in a signature verification system.
Question 105
True/False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
Question 106
True/False
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
Question 107
True/False
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
Question 108
True/False
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
Question 109
True/False
Programmers often build trapdoors into programs during system development.
Question 110
True/False
Biometric objects are entirely foolproof.
Question 111
True/False
As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
Question 112
True/False
Combating cybercrime is not one of the FBI's top priorities.
Question 113
True/False
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.