True or False
Complete the sentence
Choose the correct answer
Test your knowledge
Who and What?
100

Some web filtering software programs filter websites that use specific words.

True

100

Online games that require you to be in ________ mode are not secure.

administrator

100

A Nation state actor is a/n__________.

a. individual who disrupts a nation's computer networks until a sum of money is paid.

b. state-sponsored attacker used to launch computer attacks against enemies 

c. expert in cyberterrorism who instructs Nations in performing security audits.

b. state-sponsored attacker used to launch computer attcaks against enemies

100

What is WPA2 used to limit? 

WPA2 is used to limit who can access a Wi-Fi network.

100

Who wants to attack computers and does their job by downloading freely available automated attack software?

A script kiddie 

200

The term cybercrime does not refer to any illegal act involving the use of a computer or related devices.

True

200

In a _______ ________ users choose which folders and files to include.

Selective backup 

200

To find content that can be used, any restrictions or payment needed consult ________.

a. Complete Content 

b. Digital Depot 

c. Creative Commons 

c. Creative Commons 

200

The software used by cybercriminals is sometimes called what?

crimeware 

200

Who uses Creative Commons to find content they can use, along with restrictions or payments?

A web designer

300

A rootkit is a program that hides in a computer or mobile device and allows someone from a remote location to take full control.

True 

300

_________ involves sharing computing resources, such as servers or storage devices, among computers and devices on a network.

Virtualization

300

Which of the following best describes the activity of a bot?

a. performs a repetitive task on a network

b. accesses a computer through its backdoor 

c. controls a computer or device remotely 

a. performs a repetitive task on a network

300

Geographic areas that lack infrastructure for reliable Internet access represent a barrier to what?

Digital inclusion 

300

When you work remotely, what can you use to get a secure connection to the company's network server?

 VPN

400

Always keep your internet connection open, even when not in use, so that you don't miss any updates or patches to your apps.

False 

400

The purpose of the DMCA is to address piracy for commercial ________

software 

400

A proxy server is used to monitor________.

a. power usage 

b. employee productivity 

c. incoming and outgoing messages

c. incoming and outgoing messages

400

Accuracy of information and intellectual property rights are areas of what?

Technology ethics 

400

Who can install a backdoor on a computer to continue accessing it remotely without the user's knowledge?

A perpetrator

500

When setting up a wireless network, you should leave WPS on and turn off SSID broadcasts.

False

500

It is legal for employers to use cameras to observe, record, and review an ________ use of technology 

employee's 

500

Digital inclusion is the movement to ensure that_______

a. all software is open source and free to be modified

b. everyone has access to all resources offered online

c. e-waste disposal is not transported to developing nations

b. everyone has access to all resources offered online

500

During a digital detox, the individual abstains from using what?

Technology 

500

When setting up a wireless router, what is the name of the local wireless network?

SSID