Filters
Question type

Study Flashcards

Which of the following best describes a single sign on account?


A) A security measure that allows only one failed login attempt.
B) An individual's unique identity required to access an organization's network.
C) When you enter your name into one account and you are automatically signed into other accounts and services.
D) An organization's shared login credentials for general network access.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.

Correct Answer

verifed

verified

In the encryption process, the unencrypt...

View Answer

Passphrases are less secure than passwords.

A) True
B) False

Correct Answer

verifed

verified

A(n) ______ often uses prewritten hacking and cracking programs.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Employers can use firewalls to restrict employees' access to sensitive data.

A) True
B) False

Correct Answer

verifed

verified

IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

Correct Answer

verifed

verified

Malware is short for ______ software.


A) malicious
B) malignant
C) malevolent
D) malady

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.

Correct Answer

verifed

verified

Describe and list advantages and disadvantages of each of the following backup types: full, differential, incremental, selective, CPD, and cloud.

Correct Answer

verifed

verified

Student an...

View Answer

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.


A) control
B) firewall
C) check
D) lock

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A(n) ______ backup copies only the files that have changed since the last full backup.


A) differential
B) incremental
C) selective
D) partial

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Fingerprint readers are examples of ______ devices.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.


A) shield
B) firewall
C) back door
D) blocker

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is NOT true about CAPTCHAs?


A) A CAPTCHA is an image containing a series of distorted characters.
B) CAPTCHAs were developed to verify input is coming from computer programs, not humans.
C) The CAPTCHA text can be read aloud for visually impaired users.
D) You have the option of generating a new CAPTCHA.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Piracy is the most common form of software theft.

A) True
B) False

Correct Answer

verifed

verified

With CDP, all data is backed up whenever a change is made.

A) True
B) False

Correct Answer

verifed

verified

Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.

Correct Answer

verifed

verified

Content filtering is the process of restricting access to certain material.

A) True
B) False

Correct Answer

verifed

verified

The term ______ refers to online or Internet-based illegal acts.

Correct Answer

verifed

verified

cybercrime...

View Answer

Two users can have the same email address.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 86

Related Exams

Show Answer