Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering Computers
Quiz 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Multiple Choice
COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?
Question 82
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
Question 83
Multiple Choice
COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?
Question 84
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
Question 85
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
Question 86
Multiple Choice
COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Question 87
Multiple Choice
COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter. Which algorithm did you use?
Question 88
Multiple Choice
COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?
Question 89
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?
Question 90
Multiple Choice
COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
Question 91
Multiple Choice
COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
Question 92
Multiple Choice
COGNITIVE ASSESSMENT What is an EULA intended to do?
Question 93
Multiple Choice
COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?
Question 94
Multiple Choice
COGNITIVE ASSESSMENT You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
Question 95
Multiple Choice
COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?
Question 96
Multiple Choice
COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?
Question 97
Multiple Choice
COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?
Question 98
Multiple Choice
COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.
Question 99
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?