Cyberterrorism And Cyberwarfare Usually Require
Question: true
Answer: Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
Question: false
Answer: Viruses, worms, and trojan horses replicate themselves to other computers or devices.
Question: true
Answer: User IDs are also called user names, log on names, or sign in names.
Question: false
Answer: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
Question: false
Answer: Passphrases are less secure than passwords.
Question: differential
Answer: A(n) ______ backup copies only the files that have changed since the last full backup.
Question: students’ educational records
Answer: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______.
Question: key
Answer: An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
Question: If the web address of a website begins with https instead of http, what do you know about the website?
Answer: it is secure.
Question: cyberextortionist
Answer: A(n) ______ demands payment to stop an attack.