
End of Module Test: Module 05 Digital Security, Ethics, and Priv
Authored by Kaela T
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software used by cybercriminals is sometimes referred to as crimeware.
Software used by cybercriminals is sometimes referred to as crimeware.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best defines the practice of cybersecurity?
Which of the following best defines the practice of cybersecurity?
development of malware
analysis of criminal activity
performing a digital detox
protection against digital threats
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two of the following are examples of social engineering?
Which two of the following are examples of social engineering?
cyber-warfare
hoaxes
extortion
phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data mining is the process of sifting through Big Data to find information an attacker can use to pretend to be another person.
Data mining is the process of sifting through Big Data to find information an attacker can use to pretend to be another person.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A script kiddie is someone who wants to attack computers and does their work by ______.
A script kiddie is someone who wants to attack computers and does their work by ______.
finding software on the dark web
downloading freely available automated attack software
hiring black hat hackers to perform the act
changing a website’s contents to send a message
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Information accuracy and intellectual property rights are areas of technology ethics.
Information accuracy and intellectual property rights are areas of technology ethics.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Judson is a web designer. He uses Creative Commons in order to ______.
Judson is a web designer. He uses Creative Commons in order to ______.
ensure his website content can be found using search engines
determine if his website layout meets accessibility requirements
find content that he can use, along with restrictions or payment
verify the accuracy of the information presented in his website
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?