Table of Content
When a system sends an authentication code, it typically does not expire. If you sign in from a device you use frequently, you can elect to bypass two-step verification. ATMs usually require a two-step verification. Which of the following is NOT a recommended practice for gaming safety? Avoid games requiring passwords to be saved to an online account on a smartphone. Look for games that use ActiveX or JavaScript, as these are always safe.
When you enter your name into one account and you are automatically signed into other accounts and services. An organization's shared login credentials for general network access. What should an AUP specify? The acceptable use of technology by employees for personal reasons.
Discovering Computers ©2018: Digital Technology, Data, and Devices
Which of the following is NOT true about cloud data privacy? Law enforcement officials cannot access email messages stored on the cloud without informing the user first. The company storing the data must protect against data loss due to physical disasters. When transferring data over a network to the cloud, the data should be encrypted and authenticated. Cloud storage companies have increased their privacy and security features in recent years. Which of the following is not true about CAPTCHAs?
A CAPTCHA is an image containing a series of distorted characters. The CAPTCHA text can be read aloud for visually impaired users. You have the option of generating a new CAPTCHA. CAPTCHAs were developed to verify input is coming from computer programs, not humans. Which of the following is NOT true about CAPTCHAs? What is an audit trail?
Final Exam - Computer Science
15. Piracy is the most common form of software theft. An invisible image on a website that, if accidentally clicked, downloads a virus to the user’s computer or mobile device. Verification system compares a person’s live speech with their stored speech pattern.

Retain the default administrative password. Choose a secure location for your wireless router. Broadcast the SSID. Enable an encryption method such as WPA2.
Checking if the site connection is secure
Which of the following best describes a back door? A file recovery method that circumvents the computer or mobile device's network. An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device. A hardware device that reinforces security settings on a computer or network. 78. Which of the following is NOT a part of a typical single-user license agreement?

A log of financial transactions. A file that records access attempts. A list of passwords and user names on a network. A record of hacking attempts.
You can make one copy of the software as a backup. You can rent or lease the software. You cannot install the software on a network. You cannot export the software. What does a keygen do? Generates a list of user names and passwords for network administrators.

Is the process of converting data that is readable by humans into encoded characters. 33. A ____ license is a legal agreement that permits users to install the software on multiple computers. 12.
Creates CAPTCHA images. Analyzes typing patterns to authenticate a user. Creates software registration numbers. 42. 41.
24. 13. A ______ often uses prewritten hacking and cracking programs. A ______ backup copies only the files that have changed since the last full backup.
An iris recognition system uses technology to read patterns in the user's ______. The link you clicked may be broken or the page may have been removed. Don't stress—you can find millions of other helpful study resources on Course Hero.
Which of the following best describes a single sign on account? A security measure that allows only one failed login attempt. An individual's unique identity required to access an organization's network.
Security experts recommend using different user names and passwords for every account. Which of the following is NOT true about two-step verification? Another term for it is two-factor verification.
