What is used to describe a set of steps that can convert readable plaintext into unreadable sihetext? |
an encryption algorithum |
Can users purchase a software porgram that selectively blocks cookies? |
true |
The term zombie is… |
a computer or device whose owner is unaware that the computer or device is being controlled remotelly by an ousider |
The term, PIN, is an acronym for which of the follwing? |
personal identification number |
What does your financial service institution use to secure the transactions you make using their phone banking service? |
voice verification system |
In your encryption algorithm, you swapped adjacent character. What algorithm did you use? |
transposition |
What does your company use to track your time and attendance? |
hand geometry system |
A perpetraaotr is using a botnet. Which of the follwing is the least likely use of his botnet? |
authoring ActiveX scripts |
Which of the following does a new federal laboratory use in its high secruity areas? |
iris recognition system |
The term botnet means…. |
a group of compromised computers connected to a network that attackes the other networks |
What is not a safeguard against the failure of hardware? |
device tracking apps |
What is a small text file that a web server stores on a user’s computer? |
cookie |
What does your colege use to verify your identity? |
hand geometry system |
In your encryption algorithm, yo removed every third letter. Which algorithm did you use? |
compaction |
What term refers to a written list of guidlines that might includes rules that prevent employees from using software illegally or using computers to steal? |
an IT code of conduct |
One study found that a certain percentage of wireless connections are unsecured, leaving them susceptible to hackers. What was that percentage? |
25% |
What term is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? |
a worm |
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of teh message sender? |
a digital signature |
What term refers to someone who uses the internet or network to destory or damage compters for political reasons? |
cyberterrorist |
The term payload means…. |
the destructive even or prank the program is intended to deliver |
In your encryption algorithm, you replaced each letter wiht another letter. Which algorithm did you use? |
subsitution |
What term is used to describe a scam in which a website uncludes a button, image or link that contains a malicious program? |
clickjacking |
What is the least likely motive for a DDoS? |
spoofing |
Social engineering, as it pertains to computers, is… |
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users |
What happens during a DDoS attack? |
a zombie army is used to attack computers or computer network |
Does the Computer Abuse Amendments Act outlaw transmissions of harmful computer codes? |
True |
What statement is not true about Internet and netwokr attacks? |
Information kept on an organizaton’s premises has a higher security risk than information transmitted over networks. |
Which of the following statemens is not true about intellectual property rights? |
the term fair use refers to the rights which creators are entitled for their works |
What best describes the term cybercrime? |
online or Internet-based illegal acts |
What statement is not true about biometeric devices? |
biometeric devies are an unreliable method of identification and notification |
the term back door, as it refers to computer crime, is… |
a program or set of instructions that alll users to bypass security controls when accessing a program, computer, or network |
What term is used to describe software used by cybercriminals? |
crimeware |
What can be used to create a software registration number, sometimes illegally? |
keygen |
What does your daughter’s daycare use to verify the identity of parents who pick up with children? |
hand geometry system |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? |
digital foresnsics |
What term is used to describe a small text file that a web server stores on your computer? |
a cookie |
What does your new smartphone use to unlock the device? |
face recognition system |
What is an EULA intended to do? |
license software for individula use |
Which of the following terms refers to somone who accesses a computer or network illegally with the intent of malicious action? |
cracker |
Which of the following statements is not true about software theft? |
a keygen distributes user names and passowrds to those who register their legally puraches copies of a software program |
In order to safeguard your personal information, which of the follwoing is recommended? |
clear your history fie when you are finished browsing |
What refers to a technique intruders use to make thier network or Internet transmission appear legitamte to a victim computer or network? |
spoofing |
You have encountered a technolyg that s effective in blocking computer-generated attempts to acces a website because it is generally easy for humans to recognize distorted characters. What is this technology? |
CAPTCHA |
What statement is not true about backing up? |
wiht a selective backup, all of the files in the computer automatically are chosen to be copied. |
The term firewall is…. |
hardware and/or software that protects a nework’s resources from intrusion |
The term CAPTCHA is… |
a series of distoted characters that a user is required to enter correctly to continue using a website |
When a waiter at a restaurent steals credit card numbers to make fraudulent purchaes, it is called.. |
information theft |
Do online shopping sites generally use a session cooke to keep track of items in a user’s shoppinng cart? |
true |
What is an AUP intended to do? |
outline computer acitivites for which the cimputer and wetwork may or may not be used |
What term is used to describe a file a computer creates that records successful and unsuccessful access attempts? |
an audit trail |
What does yor financial institution use to reduce faurd? |
signature verification system |
What is the general term for programs that act a user’s knowledge and deliberately alter the computer’s operations? |
malware |
You have just provided the identification number that associates your new software purchase wiht the mobile device on which you installed the software. What is the term for this process? |
product activation |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer? |
rootkit |
What term is used to describe e the process of restricting access to certain materiel on the web? |
content filtering |
Computers ch. 5
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price