Filters
Question type

Study Flashcards

An iris recognition system uses technology to read patterns in the user's ______.


A) eye
B) fingerprints
C) signature
D) face

Correct Answer

verifed

verified

With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

Correct Answer

verifed

verified

With CDP, all data is backed up whenever a change is made.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.


A) always stay connected to the Internet
B) use a firewall
C) be cautious when clicking links in email
D) never click OK in a pop-up spyware window

Correct Answer

verifed

verified

If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.

Correct Answer

verifed

verified

Intentionally erasing software is not an example of software theft.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT If the web address of a website begins with https instead of http, what do you know about the website?


A) It likely is spoofed.
B) It is secure.
C) It provides security services and information.
D) It contains encrypted data.

Correct Answer

verifed

verified

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Correct Answer

verifed

verified

virus

Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.

Correct Answer

verifed

verified

A(n) ______ is a program that performs a repetitive task on a network.

Correct Answer

verifed

verified

Email spoofing rarely is used in virus hoaxes and spam.

Correct Answer

verifed

verified

A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

Correct Answer

verifed

verified

site

COGNITIVE ASSESSMENT You want to ensure your wireless network is secure. Which of the following should you NOT do?


A) Retain the default administrative password.
B) Choose a secure location for your wireless router.
C) Broadcast the SSID.
D) Enable an encryption method such as WPA2.

Correct Answer

verifed

verified

C

A(n) ______ backup copies only the files that have changed since the last full backup.


A) differential
B) incremental
C) selective
D) partial

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______.


A) criminal records
B) students' educational records
C) financial transactions
D) user names and passwords

Correct Answer

verifed

verified

______ is the process of converting data that is readable by humans into encoded characters.

Correct Answer

verifed

verified

The destructive event or prank a malware delivers is its ______.

Correct Answer

verifed

verified

Common digital security risks include information theft and system failure.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.


A) shield
B) firewall
C) back door
D) blocker

Correct Answer

verifed

verified

Which of the following best describes a single sign on account?


A) A security measure that allows only one failed login attempt.
B) An individual's unique identity required to access an organization's network.
C) When you enter your name into one account and you are automatically signed into other accounts and services.
D) An organization's shared login credentials for general network access.

Correct Answer

verifed

verified

Showing 1 - 20 of 86

Related Exams

Show Answer