Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Enhanced Discovering Computers Essentials
Quiz 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
Audit trails only record unsuccessful access attempts.
Question 102
True/False
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
Question 103
True/False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
Question 104
True/False
If a program or device has a default password, be sure to retain it.
Question 105
True/False
Combating cybercrime is not one of the FBI's top priorities.
Question 106
True/False
A rootkit can be a back door.
Question 107
True/False
PINs are not the same as passwords.
Question 108
True/False
Both Windows and Mac operating systems include firewall capabilities.
Question 109
True/False
Biometric objects are entirely foolproof.
Question 110
True/False
If you are nervous, a signature might not match the one on file in a signature verification system.
Question 111
True/False
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
Question 112
True/False
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
Question 113
True/False
Programmers often build trapdoors into programs during system development.
Question 114
True/False
Perpetrators of back doors trick their victims into interacting with phony websites.
Question 115
True/False
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
Question 116
True/False
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
Question 117
True/False
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
Question 118
True/False
Any illegal act involving a computer generally is referred to as a computer crime.
Question 119
True/False
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.