Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Enhanced Discovering Computers 2017 Study Set 1
Quiz 5: Digital Security Ethics and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
Question 102
True/False
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
Question 103
True/False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
Question 104
True/False
PINs are not the same as passwords.
Question 105
True/False
If a program or device has a default password, be sure to retain it.
Question 106
True/False
If you are nervous, a signature might not match the one on file in a signature verification system.
Question 107
True/False
Biometric objects are entirely foolproof.
Question 108
True/False
A rootkit can be a back door.
Question 109
True/False
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.