Module 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The CSA regulates the confidentiality of students' educational records.

False

The Internet is safer from security risk than an organization's network.

False

A back door is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.

True

A company's AUP might specify the personal activities that are allowed on company time.

True

Accidentally accessing an evil twin is a concern when using a public Wi-Fi network.

True

An IT code of conduct focuses on acceptable use of technology.

True

An SSID is the name of the local wireless network.

True

Government restrictions or censorship is one of the barriers to digital inclusion.

True

IoT access is one of the factors that contributes to the digital divide.

True

Online backup services provide the highest degree of protection to most users.

True

Passwords are the most common type of authentication in use today.

True

Piracy is a crime in which people illegally copy software, movies, and music

True

The goal of a cyberextortionist's attack is to cause disruption and panic among citizens.

True

Which of the following is not a recommended configuration for a wireless router?

Turn off SSID broadcasts.

Petra got a notification from her antivirus app that her device was infected with a Trojan horse. This type of malware _____.

negatively alters the way the device works but does not replicate itself to other computers or devices

A differential backup copies ______.

only the files that have changed since the last full backup

A DoS attack is meant to ______.

overload a server with network traffic so that it cannot provide necessary services

Henry uses 2FA as a security method. This means that Henry uses a/n ______.

password and an item in his possession

When an organization reviews their PUE, they are examining the ______.

ratio that measures how much power enters the data center against the amount of power required to run their computers

Your digital footprint is the ______.

record of everything you do online

Val works in the IT department of a large enterprise. In order to implement green computing practices, he recommends virtualization in order to ______.

share computing resources among computers and devices on the network

Which of the following privacy laws addresses protection for children?

COPPA

A copyright does not protect digital work because the work can be easily redistributed or altered.

False

A zombie is a program that performs a repetitive task on a network.

False

Crimeware is software used to prevent cybercriminals from accessing your computer or device.

False

Cybercrime is any illegal act involving the use of a computer or related devices.

False

Green computing guidelines recommend leaving a computer running overnight to avoid spending power to reboot it.

False

It is illegal for employers to use employee monitoring software.

False

One good thing about smart technology is that it doesn't allow for companies to collect your data for their own use.

False

Script kiddies have advanced computer and network skills.

False

Which of the following is not a recommended strategy for gaming security?

Only play games that require ActiveX or JavaScript.

Malai accepted a new job working remotely for a large enterprise. He uses a VPN in order to _____.

access his company's network securely

In a disaster recovery plan, the recovery plan specifies the ______.

actions the organization will take to restore full computer operations

CDP copies ______.

all data whenever a change is made

A company can use a proxy server to ______.

control which communications pass in and out of the organization's network

A computer worm _____.

copies itself repeatedly, using up resources and possibly shutting down the computer, device, or network

The DRM strategy was developed to address issues with ______.

copyright law

A cracker is someone who accesses a computer or network illegally, but has the intent of ______.

destroying data or stealing information

A malware's payload is its ______.

destructive event

Digital forensics is the ______.

discovery, collection, and analysis of evidence found on computers and devices

Authentication is the process of ______.

ensuring the person requesting access to a computer is not an imposter

The FACTA privacy laws provide rules for ______.

financial institutions

HIPAA privacy laws provide rules affecting ______.

healthcare information location accuracy

Rajon got a notification from his antivirus app that his device was infected with a rootkit. This type of program _____.

hides in a computer or device and allows someone from a remote location to take full control of the device

Digital ______ is the movement to ensure that all users have access to the devices, data, and infrastructure required to receive high-speed, accurate, reliable information.

inclusion

When configuring a wireless router, you can use a WPS to ______.

simplify setting up the security

In a disaster recovery plan, the test plan specifies the ______.

simulations of disasters and the recording of the organization's ability to recover

Which of the following best describes a white hat hacker?

someone who hacks in order to expose flaws and recommend fixes

A MAC address control feature ______.

specifies which computers and mobile devices can connect to a network

In a disaster recovery plan, the emergency plan specifies the ______.

steps the organization will take as soon as disaster strikes

An audit trail is a type of access control that a computer, device, or network uses to record ______.

successful and unsuccessful access attempts

Jack's roommate recommended that they participate in a digital detox. During this time period, Jack and his roommate will ______.

take a break from their digital devices

Content filtering opponents argue that banning any materials violates

the constitutional guarantee of free speech

A backup is a duplicate of a file, program or media, that can be used if ______.

the original is lost, damaged, or destroyed

The technical term for attackers who launch attacks against other users and their computers is ______.

threat actor

The dark web is a part of the web where ______.

users and website operators can remain anonymous while performing illegal actions

Jiun visits a website that uses a CAPTCHA as a security method to ______.

verify user input is from a human

Which of the following best defines social engineering?

when an attacker tricks a victim into giving out valuable information


Set pelajaran terkait

History of Rock and Roll Chapter 7

View Set

Chapter 9, Chapter 10, Chapter 12, Chapter 13

View Set

ISDS705: Chapter 13: Information Security: Barbarians at the Gateway (and Just About Everywhere Else)

View Set

CHAPTER 7: Web 2.0 and social media

View Set

AP Literature - Independent Reading

View Set

Ch 3: Student Rights and Restrictions

View Set

Chapter 5: Genetics and Genomics

View Set