True or False |
True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it’s lost. |
Displays unwanted advertisements in banners or pop-up windows on your computer |
Adware |
Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission |
Spyware |
Used by commercial Web site vendors to identify users and customize Web pages |
Cookie |
Common forms include computer viruses, Trojan horses, and worms |
Malware |
Computer taken over by hackers to perform malicious tasks across a network |
Bot |
Computer Generation |
First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer |
Type of power supply/battery backup device that can prevent some forms of data loss |
uninterruptible |
Type of hacker who intends serious harm through espionage, theft, or disruption of a network |
Black Hat |
Events that account for almost half of total catastrophic data losses |
hurricanes and storms |
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people |
cyberterrorism |
Type of hacker who wants to show off their skills and doesn’t intend any serious damage |
White Hat |
Type of malware that spreads without human interaction, sending itself out to everyone in your address book |
worm |
Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information |
phishing |
Type of malware that collects bits of data, like your surfing habits |
spyware |
Type of malware that is spread when you distribute infected files, especially as e-mail attachments |
virus |
A slowed down Wi-Fi connection can be the result of this |
piggybacking |
Indication that a Web site is secure for shopping |
https:// |
Indication that a Web site is not secure |
misspelled company name |
Online payment method to avoid |
money transfer |
One secure method of online payment |
electronic wallet |
The nation’s fastest growing crime, where victims are unaware it’s being committed until the damage is done |
Identity theft |
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons |
Components of an online profile |
A set of online communication practices and rules |
Netiquette |
First step to take when being cyberbullied or cyberstalked |
Report abuse quickly |
Items an identity thief can obtain to impersonate you |
Driver’s license, birth certificate |
True or False |
True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive |
Legal or Illegal |
Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source |
What occurs when someone steals personal or confidential information |
Information theft |
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following |
ethical |
In order to safeguard your personal information, which of the following is recommended |
Clear your history file when you are finished browsing |
The term back door, as it refers to computer crime, is |
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network |
Unless you want to allow others to follow your locations throughout the day, disable the |
GPS |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks |
digital forensics |
Which of the following does your college use to verify your identity |
hand geometry system |
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service |
voice verification system |
Which of the following statements is not true about intellectual property rights |
The term fair use refers to the rights which creators are entitled for their work |
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts |
an audit trail |
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network |
a worm |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer |
a rootkit |
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program |
clickjacking |
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender |
a digital signature |
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action |
cracker |
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process |
product activation |
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited |
employee monitoring |
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed |
Backup |
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network |
Spoofing |
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability |
Digital Security risk |
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate |
Digital |
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them |
information privacy |
True |
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages |
False |
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development |
… |
… |
… |
… |
… |
… |
E. Technology 5
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price