Chapter 5 Test, Chapter 6 Test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Trojan horse

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

virus

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

switch

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

access point

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

netiquette

The term _________ refers to the set of online behaviors that are considered polite and proper.

Who you know

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Outsourcing

_________ occurs when an organization transfers some aspect of their business to a third party.

Automation

_________ occurs when computers or machines can perform the work that was once done by a human.

Strong

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Digital

_________ refers to the technology gap that exists between different social and economic classes.

Botnets

_________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

acceptable use policy

A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

surge protector

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

True

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

hacker

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

privacy policy

Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users and what is done with that information.

VPN

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

False

Copyright protection lasts 20 years after the date of publication or release.

packets

Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

True

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

True

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

bandwidth

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

True

For those who have lost a limb, engineers have developed robotic prosthesis that can perform a variety of movements by simply projecting a thought to them.

WAN

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

tape

Large organizations often use a(n) _________ library for backups and archives of their data.

NSA

Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.

False

Social engineering is a form of hacking that has a social or political agenda behind it.

DRM

Software is sometimes illegally modified in order to disable _________ technologies such as copy protection and authenticity checks.

True

The network that connects the computers in a school's study center or library is considered a LAN.

802.11x

Which of the following is NOT one of the specifications of Wi-Fi technology?

Watson

_________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Phishing

_________ involves luring individuals into entering personal information into a website controlled by the hacker.

Nanotechnology

_________ involves the creation or manipulation of matter at the smallest possible scale.

Private browsing

_________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Spyware

_________ is a type of malware which is designed to report activity on your computer to another party.

Biotechnology

_________ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Whistleblowing

_________ is the act of alerting the public about harmful activities that are being hidden by an organization.

Trolling

_________ is the act of being annoying and antagonistic in online social interactions.

Telecommuting

_________ is the process of working for a company without being physically present at the company's office.

DDoS

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

fiber-optic

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

worm

A _________ is a *fully-contained* program that self-replicates and spreads through computers and networks.

countermeasure

Any step you take to ward off a threat is called a:

fair use

Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

True

Creative works such as books, songs, and photographs are protected by copyright law.

piracy

In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

True

Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.

True

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

FAQ

Many websites have a(n) _________ area that should be checked for common questions and their responses.

True

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

False

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

Ethernet

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

True

Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.

Kensington

The _________ lock can make it difficult for thieves to steal a laptop.

scareware

The scam known as _________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

False

The sleep mode on a computer generally saves more electricity than hibernate mode.

UPS

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

Ad-supported streaming

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

True

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

Logs

_________ are files that record activities and events on a computer.


Kaugnay na mga set ng pag-aaral

AWS Privacy Industry Specialist - Devices

View Set

Pharm 2 Chapter 49: Drugs Used to Treat Anemias 5-8

View Set

Chapter 22 Investors and the Investment Process, FINA chp 16, Investments 12, Finance 327: Chapter 15, FIN 3826 Chapter 11, fin363 review, Finance 351: Chapter 9, CH 8 Investment Review, Investment Final Ch 8, FIN 3826 Ch 8, Investments Chapter 7, 7,...

View Set

Production, Operations, and Supply Chain Management

View Set

Quiz 3 - Musculoskeletal Conditions

View Set