5.2.2 Quiz: Internet Security and Law

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is the strongest password?

8)oscysbydel%2

Which statement is true about biometrics as an authentication method?

Computer scientists are always trying to improve biometric authentication methods.

When should you change passwords?

Every couple of months or whenever you give it to someone else.

Computer identity theft differs from theft in the real world in what major way?

Identity theft can affect your credit without you knowing.

Many phone fraud scammers are especially cunning because they approach the target to try to sell _______.

Improved Computer Security Programs

Worms and trojan horses are examples of _______.

Malware

Which of the following is a category of authentication tools?

Something you have.

What is the LEAST effective step to keep young people safe from online predators?

Take away their computer and phone if you catch them in a chat room.

Why are many otherwise safety-conscious people victims of internet crime?

They have not been educated in safe digital best practices.

What is the major difference between cyber vandalism and online piracy?

Vandals went to disrupt and showoff a viewpoint; the goal of online piracy is to steal money.


Conjuntos de estudio relacionados

L 201 Class 9- Chapter 37 and 41

View Set

Sequences and series (Definitions and formulas)

View Set

ch 54 Drugs Acting on the Upper Respiratory Tract

View Set

Chapter 7 - Pattern Matching with Regular Expressions

View Set

CH 21-22 (Theory of metal machining/Machine tools and operations)

View Set