Ch. 5 Practest test A

Your page rank:

Total word count: 1124
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

What is the term for a program that performs a repetitive task on a network?

Bot

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

Backup

Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

an encryption algorithm

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

A worm

Which of the following can transmit germs?

Hand Geometry Systems

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

voice verification system

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

Copyright

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

a rootkit

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called

Informational Theft

The term firewall is

hardware and/or software that protects a network’s resources from intrusion

With a three-generation backup policy, the grandparent is which of the following?

oldest copy of the file

Which term is used to describe software used by cybercriminals?

crimeware

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

ethical

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

malware

Which of the following statements is not true about backing up?

With a selective backup, all of the files in the computer automatically are chosen to be copied.

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

an audit trail

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

an IT code of conduct

What is an EULA intended to do?

license software for individual use

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

network

Many businesses use which of the following to limit employees’ web access?

content filtering

What is an AUP intended to do?

outline computer activities for which the computer and network may or may not be used

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

information privacy

Which of the following does a new federal laboratory use in its high security areas?

iris recognition system

What term is used to describe the process of restricting access to certain material on the web?

content filtering

Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

employee monitoring

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

In your encryption algorithm, you removed every third letter. Which algorithm did you use?

compaction

Which of the following is an authorized person or company that issues and verifies digital certificates?

certificate authority

Which of the following copies all of the files in a computer?

full backup

The term, zombie, is

a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Which of the following statements is not true about biometric devices?

Biometric devices are an unreliable method of identification and notification.

The term, botnet, means

a group of compromised computers connected to a network that attacks other networks

Which of the following statements is not true about software theft?

A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

phishing

How long can digital certificates be valid?

two years

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called

information theft

Which of the following is the process of restricting access to certain material on the web?

content filtering

What is another name for public key encryption?

asymmetric key encryption

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

substitution

Which of the following does your new smartphone use to unlock the device?

face recognition system

Which of the following does your company use to track your time and attendance?

hand geometry system

Which of the following terms means in a location separate from the computer site?

Off site

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

A digital Sender

In order to safeguard your personal information, which of the following is recommended?

Clear your history file when you are finished browsing

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

Cracker

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Digital Security risk

Which of the following terms refers to making a copy of a file?

backing up

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

Digital Forensics

Which of the following is not a security product developer?

Adobe

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

macros

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

site

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Spoofing

Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Spoofing

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

Digital

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

Cyberterrorist

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending