Module 5
The CSA regulates the confidentiality of students' educational records.
False
The Internet is safer from security risk than an organization's network.
False
A back door is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
True
A company's AUP might specify the personal activities that are allowed on company time.
True
Accidentally accessing an evil twin is a concern when using a public Wi-Fi network.
True
An IT code of conduct focuses on acceptable use of technology.
True
An SSID is the name of the local wireless network.
True
Government restrictions or censorship is one of the barriers to digital inclusion.
True
IoT access is one of the factors that contributes to the digital divide.
True
Online backup services provide the highest degree of protection to most users.
True
Passwords are the most common type of authentication in use today.
True
Piracy is a crime in which people illegally copy software, movies, and music
True
The goal of a cyberextortionist's attack is to cause disruption and panic among citizens.
True
Which of the following is not a recommended configuration for a wireless router?
Turn off SSID broadcasts.
Petra got a notification from her antivirus app that her device was infected with a Trojan horse. This type of malware _____.
negatively alters the way the device works but does not replicate itself to other computers or devices
A differential backup copies ______.
only the files that have changed since the last full backup
A DoS attack is meant to ______.
overload a server with network traffic so that it cannot provide necessary services
Henry uses 2FA as a security method. This means that Henry uses a/n ______.
password and an item in his possession
When an organization reviews their PUE, they are examining the ______.
ratio that measures how much power enters the data center against the amount of power required to run their computers
Your digital footprint is the ______.
record of everything you do online
Val works in the IT department of a large enterprise. In order to implement green computing practices, he recommends virtualization in order to ______.
share computing resources among computers and devices on the network
Which of the following privacy laws addresses protection for children?
COPPA
A copyright does not protect digital work because the work can be easily redistributed or altered.
False
A zombie is a program that performs a repetitive task on a network.
False
Crimeware is software used to prevent cybercriminals from accessing your computer or device.
False
Cybercrime is any illegal act involving the use of a computer or related devices.
False
Green computing guidelines recommend leaving a computer running overnight to avoid spending power to reboot it.
False
It is illegal for employers to use employee monitoring software.
False
One good thing about smart technology is that it doesn't allow for companies to collect your data for their own use.
False
Script kiddies have advanced computer and network skills.
False
Which of the following is not a recommended strategy for gaming security?
Only play games that require ActiveX or JavaScript.
Malai accepted a new job working remotely for a large enterprise. He uses a VPN in order to _____.
access his company's network securely
In a disaster recovery plan, the recovery plan specifies the ______.
actions the organization will take to restore full computer operations
CDP copies ______.
all data whenever a change is made
A company can use a proxy server to ______.
control which communications pass in and out of the organization's network
A computer worm _____.
copies itself repeatedly, using up resources and possibly shutting down the computer, device, or network
The DRM strategy was developed to address issues with ______.
copyright law
A cracker is someone who accesses a computer or network illegally, but has the intent of ______.
destroying data or stealing information
A malware's payload is its ______.
destructive event
Digital forensics is the ______.
discovery, collection, and analysis of evidence found on computers and devices
Authentication is the process of ______.
ensuring the person requesting access to a computer is not an imposter
The FACTA privacy laws provide rules for ______.
financial institutions
HIPAA privacy laws provide rules affecting ______.
healthcare information location accuracy
Rajon got a notification from his antivirus app that his device was infected with a rootkit. This type of program _____.
hides in a computer or device and allows someone from a remote location to take full control of the device
Digital ______ is the movement to ensure that all users have access to the devices, data, and infrastructure required to receive high-speed, accurate, reliable information.
inclusion
When configuring a wireless router, you can use a WPS to ______.
simplify setting up the security
In a disaster recovery plan, the test plan specifies the ______.
simulations of disasters and the recording of the organization's ability to recover
Which of the following best describes a white hat hacker?
someone who hacks in order to expose flaws and recommend fixes
A MAC address control feature ______.
specifies which computers and mobile devices can connect to a network
In a disaster recovery plan, the emergency plan specifies the ______.
steps the organization will take as soon as disaster strikes
An audit trail is a type of access control that a computer, device, or network uses to record ______.
successful and unsuccessful access attempts
Jack's roommate recommended that they participate in a digital detox. During this time period, Jack and his roommate will ______.
take a break from their digital devices
Content filtering opponents argue that banning any materials violates
the constitutional guarantee of free speech
A backup is a duplicate of a file, program or media, that can be used if ______.
the original is lost, damaged, or destroyed
The technical term for attackers who launch attacks against other users and their computers is ______.
threat actor
The dark web is a part of the web where ______.
users and website operators can remain anonymous while performing illegal actions
Jiun visits a website that uses a CAPTCHA as a security method to ______.
verify user input is from a human
Which of the following best defines social engineering?
when an attacker tricks a victim into giving out valuable information