Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering Computers
Quiz 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
Biometric objects are entirely foolproof.
Question 102
True/False
Audit trails only record unsuccessful access attempts.
Question 103
True/False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
Question 104
True/False
Perpetrators of back doors trick their victims into interacting with phony websites.
Question 105
True/False
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
Question 106
True/False
As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
Question 107
True/False
A rootkit can be a back door.
Question 108
True/False
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
Question 109
True/False
Both Windows and Mac operating systems include firewall capabilities.
Question 110
True/False
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
Question 111
True/False
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
Question 112
True/False
Any illegal act involving a computer generally is referred to as a computer crime.
Question 113
True/False
If a program or device has a default password, be sure to retain it.
Question 114
True/False
If you are nervous, a signature might not match the one on file in a signature verification system.
Question 115
True/False
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.