Some web filtering software programs filter websites that use specific words.
True
Online games that require you to be in ________ mode are not secure.
administrator
A Nation state actor is a/n__________.
a. individual who disrupts a nation's computer networks until a sum of money is paid.
b. state-sponsored attacker used to launch computer attacks against enemies
c. expert in cyberterrorism who instructs Nations in performing security audits.
b. state-sponsored attacker used to launch computer attcaks against enemies
What is WPA2 used to limit?
WPA2 is used to limit who can access a Wi-Fi network.
Who wants to attack computers and does their job by downloading freely available automated attack software?
A script kiddie
The term cybercrime does not refer to any illegal act involving the use of a computer or related devices.
True
In a _______ ________ users choose which folders and files to include.
Selective backup
To find content that can be used, any restrictions or payment needed consult ________.
a. Complete Content
b. Digital Depot
c. Creative Commons
c. Creative Commons
The software used by cybercriminals is sometimes called what?
crimeware
Who uses Creative Commons to find content they can use, along with restrictions or payments?
A web designer
A rootkit is a program that hides in a computer or mobile device and allows someone from a remote location to take full control.
True
_________ involves sharing computing resources, such as servers or storage devices, among computers and devices on a network.
Virtualization
Which of the following best describes the activity of a bot?
a. performs a repetitive task on a network
b. accesses a computer through its backdoor
c. controls a computer or device remotely
a. performs a repetitive task on a network
Geographic areas that lack infrastructure for reliable Internet access represent a barrier to what?
Digital inclusion
When you work remotely, what can you use to get a secure connection to the company's network server?
VPN
Always keep your internet connection open, even when not in use, so that you don't miss any updates or patches to your apps.
False
The purpose of the DMCA is to address piracy for commercial ________
software
A proxy server is used to monitor________.
a. power usage
b. employee productivity
c. incoming and outgoing messages
c. incoming and outgoing messages
Accuracy of information and intellectual property rights are areas of what?
Technology ethics
Who can install a backdoor on a computer to continue accessing it remotely without the user's knowledge?
A perpetrator
When setting up a wireless network, you should leave WPS on and turn off SSID broadcasts.
False
It is legal for employers to use cameras to observe, record, and review an ________ use of technology
employee's
Digital inclusion is the movement to ensure that_______
a. all software is open source and free to be modified
b. everyone has access to all resources offered online
c. e-waste disposal is not transported to developing nations
b. everyone has access to all resources offered online
During a digital detox, the individual abstains from using what?
Technology
When setting up a wireless router, what is the name of the local wireless network?
SSID