Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
____ apps can allow you to lock your mobile device and SIM card remotely.
|
Answer: mobile security |
|
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
|
Answer: distributed |
|
What is the term for a program that performs a repetitive task on a network?
|
Answer: bot |
|
How much do fingerprint readers typically cost?
|
Answer: less than $100 |
|
What is an EULA intended to do?
|
Answer: license software for individual use |
|
Which of the following provides the mobile user with a secure connection to the company network server?
|
Answer: VPN |
|
Which of the following best describes the term, cybercrime?
|
Answer: online or Internet-based illegal acts |
|
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
|
Answer: network |
|
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
|
Answer: cracker |
|
The term firewall is ...
|
Answer: hardware and/or software that protects a network's resources from intrusion |
|
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
|
Answer: backup |
|
Which of the following is an authorized person or company that issues and verifies digital certificates?
|
Answer: certificate authority |
|
Which of the following copies all of the files in a computer?
|
Answer: full backup |
|
What occurs when someone steals personal or confidential information?
|
Answer: information theft |
|
Which of the following statements is not true about biometric devices?
|
Answer: Biometric devices are an unreliable method of identification and notification. |
|
What happens during a DDoS attack?
|
Answer: A zombie army is used to attack computers or computer networks. |
|
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
|
Answer: cyberterrorist |
|
Which of the following categories are the rights to which creators are entitled for their work?
|
Answer: intellectual property |
|
The term CAPTCHA is _____________.
|
Answer: a series of distorted characters that a user is required to enter correctly to continue using a website. |
|
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
|
Answer: IP |
|
Websites use which of the following to keep track of items in a user’s shopping cart?
|
Answer: session cookie |
|
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
|
Answer: employee monitoring |
|
How long can digital certificates be valid?
|
Answer: two years |
|
With which of the following do users choose which folders and files to include in a backup?
|
Answer: selective backup |
|
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
|
Answer: malware |
|
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
|
Answer: They restore the files. |
|
Internet advertising firms often use which of the following to collect information about users web browsing habits?
|
Answer: spyware |
|
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
|
Answer: spoofing |
|
Which encryption algorithm inserts characters between existing characters?
|
Answer: expansion |
|
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
|
Answer: decryption |
|
What is another name for public key encryption?
|
Answer: asymmetric key encryption |
|
Into which of the following kinds of ports do external fingerprint readers plug?
|
Answer: USB |
|
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
|
Answer: script kiddie |
|
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
|
Answer: Electronic Communications Privacy Act (ECPA) |
|
With a three-generation backup policy, the grandparent is which of the following?
|
Answer: oldest copy of the file |
|
Which of the following terms refers to making a copy of a file?
|
Answer: backing up |
|
Which of the following is not a possessed object?
|
Answer: PIN |
|
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
|
Answer: macros |
|
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
|
Answer: digital |
|
Which of the following is not a security product developer?
|
Answer: Adobe |
|
What is the term for a website that uses encryption techniques to protect its data?
|
Answer: secure site |
|
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
|
Answer: password |
|
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
|
Answer: information privacy |
|
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
|
Answer: copyright |
|
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
|
Answer: ENERGY STAR |
|
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
|
Answer: a rootkit |
|
Which of the following statements is not true about intellectual property rights?
|
Answer: The term fair use refers to the rights which creators are entitled for their work. |
|
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
|
Answer: digital forensics |
|
Which of the following statements is not true about backing up?
|
Answer: With a selective backup, all of the files in the computer automatically are chosen to be copied. |
|
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
|
Answer: CAPTCHA |
|
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called:
|
Answer: information theft |
|
The term, payload, as it pertains to computer crime, is defined as...
|
Answer: the destructive event or prank the program is intended to deliver |
|
The term back door, as it refers to computer crime, is...
|
Answer: a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network |
|
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
|
Answer: 25% |
|
Which of the following does your college use to verify your identity?
|
Answer: digital forensics system |
|
Which of the following statements is not true about Internet and network attacks?
|
Answer: Information kept on an organization’s premises has a higher security risk than information transmitted over networks. |
|
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
|
Answer: malware |
|
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
|
Answer: voice verification system |
|
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
|
Answer: ethical |
|
Which of the following is the least likely motive for a DDoS?
|
Answer: spoofing |
|
Which of the following is the process of restricting access to certain material on the web?
|
Answer: content filtering |
|
Social engineering, as it pertains to computers, is...
|
Answer: gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users |
|
Many businesses use which of the following to limit employees’ web access?
|
Answer: content filtering |