Assessment 2 - Attempt Review
Assessment 2 - Attempt Review
QUIZ
Question 1
Correct
Question 2
Correct
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for
decision making.
a. immersion
b. convergence
c. integration
d. telepresence
Correct
a. HIPAA
b. GDPR
c. COPPA
d. FACTA
Question 4
Correct
a. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers
b. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
c. copyright holders can perform a copyrighted work by means of digital audio transmission
Question 5
Correct
a. middle-tier
b. data tier
c. two-tier
d. session tier
Correct
A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent
from computer to computer over a network.
a. packet
b. bandwidth
c. protocol
d. topology
Question 7
Correct
A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.
Correct
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information
security.
a. SWOT analysis
b. McCumber cube
c. Bohr model
Question 9
Correct
Deepfakes are fake videos or audio recordings that look and sound just like the real thing.
Section 4.1
Question 10
Correct
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal
information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
a. cybersquatting
b. screening
c. sniffing
d. pharming
Correct
_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.
b. An analog modem
c. A cable modem
Question 12
Incorrect
Social engineering is an attack that takes advantage of the backdoors in security systems.
True
False
Question 13
Correct
A rootkit is a series of software tools that enable an unauthorized user to gain access to a computer or
network system without being detected.
Correct
True
False
Question 15
Correct
Question 16
Correct
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
Correct
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
b. the person using a credit card number is the card’s legitimate owner.
Question 18
Correct
Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future.
True
False
Question 19
Correct
a. CounterSpy
b. Dashlane
c. FilePro
d. STOPzilla
Correct
c. It increases productivity.
Question 21
Incorrect
Question 22
Correct
Correct
Question 24
Incorrect
a. wired keyboards
c. correct lighting
Question 25
Not answered
_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of
the mind” developed by people or businesses.
b. Information policy
c. A virtual organization
d. Intellectual property