What is the term for a program that performs a repetitive task on a network? |
Bot |
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed? |
Backup |
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? |
an encryption algorithm |
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? |
A worm |
Which of the following can transmit germs? |
Hand Geometry Systems |
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service? |
voice verification system |
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials? |
Copyright |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer? |
a rootkit |
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called |
Informational Theft |
The term firewall is |
hardware and/or software that protects a network’s resources from intrusion |
With a three-generation backup policy, the grandparent is which of the following? |
oldest copy of the file |
Which term is used to describe software used by cybercriminals? |
crimeware |
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? |
ethical |
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? |
malware |
Which of the following statements is not true about backing up? |
With a selective backup, all of the files in the computer automatically are chosen to be copied. |
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts? |
an audit trail |
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? |
an IT code of conduct |
What is an EULA intended to do? |
license software for individual use |
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously? |
network |
Many businesses use which of the following to limit employees’ web access? |
content filtering |
What is an AUP intended to do? |
outline computer activities for which the computer and network may or may not be used |
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them? |
information privacy |
Which of the following does a new federal laboratory use in its high security areas? |
iris recognition system |
What term is used to describe the process of restricting access to certain material on the web? |
content filtering |
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited? |
employee monitoring |
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? |
script kiddie |
In your encryption algorithm, you removed every third letter. Which algorithm did you use? |
compaction |
Which of the following is an authorized person or company that issues and verifies digital certificates? |
certificate authority |
Which of the following copies all of the files in a computer? |
full backup |
The term, zombie, is |
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider |
Which of the following statements is not true about biometric devices? |
Biometric devices are an unreliable method of identification and notification. |
The term, botnet, means |
a group of compromised computers connected to a network that attacks other networks |
Which of the following statements is not true about software theft? |
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program. |
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information? |
phishing |
How long can digital certificates be valid? |
two years |
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called |
information theft |
Which of the following is the process of restricting access to certain material on the web? |
content filtering |
What is another name for public key encryption? |
asymmetric key encryption |
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? |
substitution |
Which of the following does your new smartphone use to unlock the device? |
face recognition system |
Which of the following does your company use to track your time and attendance? |
hand geometry system |
Which of the following terms means in a location separate from the computer site? |
Off site |
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender? |
A digital Sender |
In order to safeguard your personal information, which of the following is recommended? |
Clear your history file when you are finished browsing |
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? |
Cracker |
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? |
Digital Security risk |
Which of the following terms refers to making a copy of a file? |
backing up |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? |
Digital Forensics |
Which of the following is not a security product developer? |
Adobe |
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly? |
macros |
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount? |
site |
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? |
Spoofing |
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? |
Spoofing |
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? |
Digital |
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? |
Cyberterrorist |
Ch. 5 Practest test A
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price