I Hate CBT's

View Original

Cyberterrorism And Cyberwarfare Usually Require

Question: true

Answer: Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

Question: false

Answer: Viruses, worms, and trojan horses replicate themselves to other computers or devices.

Question: true

Answer: User IDs are also called user names, log on names, or sign in names.

Question: false

Answer: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

Question: false

Answer: Passphrases are less secure than passwords.

Question: differential

Answer: A(n) ______ backup copies only the files that have changed since the last full backup.

Question: students’ educational records

Answer: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.

FERPA regulates the confidentiality of ______.

Question: key

Answer: An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

Question: If the web address of a website begins with https instead of http, what do you know about the website?

Answer: it is secure.

Question: cyberextortionist

Answer: A(n) ______ demands payment to stop an attack.