CIS 109

¡Supera tus tareas y exámenes ahora con Quizwiz!

Pre-digital technology is:

Often enhanced by the introduction of digital features

A digital signature can provide which of the following benefits?

Data Integrity

Which technology hides the existence of data?

Steganography

Which of the following is a program advertised as performing one activity but actually does something else?

trojan

What are the three types of malware that have the primary traits of circulation and/or infection?

viruses, Trojans, and worms

From what term is war driving derived?

war dialing

Which type of web browser enhancement can change browser menus or create additional toolbars?

Add-on

Which of the following is a risk associated with the use of private data?

Associations with groups.

What type of backup is performed continually without any intervention by the user?

Continuous Backup

What do web servers use to track whether a user has previously visited a web site?

Cookies

When we talk about the uniqueness of cybertechnology, we mean that:

Digital technology has dramatically enhanced nearly every technology that came before it due to digital technology's scope of impact, speed, access & ease of use

What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?

Drive-by-download

What is contained within the body of an email message as a shortcut to a website?

Embedded Hyperlink

What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?

Encryption

What law contains rules regarding consumer privacy

Fair and Accurate Credit Transactions Act

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

GLBA (gramm leach bliley act)

Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

HIPAA

In the past, which term was commonly used to refer to a person who uses advanced computer skills to attack computers?

Hacker

Which of the following is an advantage of hardware encryption over software encryption?

Hardware encryption is not subject to attacks like software encryption.

Which of the following creates a digest and does not create ciphertext that can later be decrypted?

Hash Algorithm

Which of the following is NOT an element of asymmetric cryptography?

Hash algorithm

Ethical concerns about privacy have risen greatly because:

Inadequate attention is paid to developing public policy and good data security practices

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

Keylogger

What security feature can you use to cause a mobile device to be completely locked for a period of time if the passcode is entered incorrectly a number of times?

Lockout period

Which of the following can be described as a poisoned ad attack?

Malvertising

Which of the following can be described as data that is used to describe the content or structure of the actual data?

Metadata

When we talk about the uniqueness of cyberethics, we mean that:

New cybertechnology capabilities have given rise to dramatically new versions of traditional ethics issues

Which of the following is NOT true about privacy?

Privacy of any level that you desire is easily achievable today.

What is another name for asymmetric cryptography?

Public key cryptography

On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?

Remote Wipe

Which type of malware will hide or remove all traces of evidence that may reveal the malware, such as log entries?

Rootkit

What serves as the network name identifier in a Wi-Fi network?

SSID

What can be used to run JavaScript in a restricted environment and limit what resources it can access?

Sandboxing

What type of software update is a cumulative package of all patches and feature updates?

Service Pack

____ look for specific words and block email messages containing those words.

Spam Filters

HTTP is based on which larger set of standards for Internet communication?

TCP/IP

Which of the following is a type of action that has the potential to cause harm?

Threat

Which term is best described as a person or element that has the power to carry out a threat?

Threat Agent

Which of these is a characteristic of a secure hash algorithm?

Two different sets of data cannot produce the same digest

What is the best approach to establishing strong security with passwords?

Use technology for managing passwords

Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet?

Wireless Router

Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?

ad hoc

What can an attacker use to divert all mail to their post office box so that the victim is never aware that personal information has been stolen?

change-of-address form

Which of the following is a place where steganography can hide data?

in the metadata of a file

What term is frequently used to describe the tasks of securing information that is in a digital format?

information security

What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?

plaintext

What popular online activity involves grouping individuals and organizations into clusters or groups based on their likes and interests?

social networking

Which phrase best describes security?

the goal to be free from danger as well as the process that achieves that freedom

Which of the following is a characteristic of a weak password?

used on multiple accounts

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

userB's private key

What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?

virtual private network

Which of the following is NOT a privacy best practice?

Always carry your Social Security number with you

Which of the following ensures that data is accessible when needed to authorized users?

Availability

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?

Denying Services

Which of the following involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Identity Theft

The ____ is a worldwide set of interconnected computers, servers, and networks.

Internet

Which of the following is a general term that refers to a wide variety of damaging or annoying software programs?

Malware

Which term can be described as a publicly released software security update intended to repair a vulnerability?

Patch

Information contained on devices is protected by three layers: Two of the layers are products and policies and procedures. What is the third layer?

People

Using which Internet security best practice is information not saved by the browser, such as pages that are visited will not be recorded to history or the address bar?

Private Browsing

Which type of malware is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

Rootkit

Whereas phishing involves sending millions of generic e-mail messages to users, which type of similar attack targets only specific users?

Spear-Phishing

What is the most secure option for the type of passcode that can be entered to access a mobile device?

Strong Alphanumeric Password

The term "cyberethics" refers to:

The ethical issues raised by cybertechnology and its uses , The societal issues raised by cybertechnology and its uses , The public policy issues raised by cybertechnology and its uses.

Which Windows feature provides information to users and obtains their approval before a program can make a change to the computer's settings?

User Account Control

vulnerability

What is a flaw or weakness that allows a threat agent to bypass security?

The ____ is composed of Internet server computers on networks that provide online information in a specific format.

World Wide Web

Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?

Worm

An infected robot computer is known as a ____.

Zombie

What type of attack is a false warning, often contained in an email message claiming to come from the information technology (IT) department?

hoaxes

Security is ____ convenience.

inversely proportional to

What security feature on a smartphone prevents the device from being used until a passcode is entered?

lock screen

What type of malware can, for example, locks up a user's computer and then display a message that purports to come from a law enforcement agency that states the user must pay a fine for illegal activity? adware

ransomware

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

signature


Conjuntos de estudio relacionados

Molekulinė biologija - DNR spiralių B, A, Z šeimų ypatybės

View Set

computer science excel and access

View Set

Steps of Ethical Decision Making

View Set

Ap Human Geo Practice Questions Unit 1-4

View Set

U.S. Foreign Policy Exam 2 Review

View Set

Medical Sales College: Internship Quiz

View Set

MTA 98-366 Networking Fundamentals

View Set

The Notorious Jumping Frog of Calaveras County

View Set