Search Header Logo

AIS160 Chapter 5: Digital Security, Ethics, and Privacy

Authored by MARJAN MARJAN

Computers

University

Used 262+ times

AIS160 Chapter 5: Digital Security, Ethics, and Privacy
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A(n) ......... was originally a complimentary work for a computer enthusiast.

cracker

hacker

script kiddie

cyber extortionist

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A(n) .......... has a goal of destroying data or stealing information.

cracker

hacker

script kiddie

cyber extortionist

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A(n) ______ often uses prewritten hacking and cracking programs.

cracker

hacker

script kiddie

cyber extortionist

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A(n) ______ demands payment to stop an attack.

cracker

hacker

script kiddie

cyber extortionist

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Malware is short for .............. software.

malignant

malevolent

malicious

malady

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Passcode is another term for a(n) ______.

user name

PIN

encryption algorithm

passphrase

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Another term for botnet is ..........army.

ghost

spy

vampire

zombie

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?