Discovering Computers Ch. 5
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? -decryption -digitization -re-securing -assessment
decryption
Which of the following statements is not a safeguard against the failure of hardware? -UPS -device-tracking apps -fault-tolerant computers -surge protectors
device-tracking apps
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? -assigned -secure -protected -digital
digital
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? -network compromise -technical terrorism -digital security risk -information liability
digital security risk
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? -acceptable -ethical -practical -permissible
ethical
Which of the following does your new smartphone use to unlock the device? -iris recognition system -hand geometry system -digital forensics system -face recognition system
face recognition system
Which of the following copies all of the files in a computer? -differential backup -selective backup -full backup -incremental backup
full backup
Social engineering, as it pertains to computers, is _____________. -filtering Internet content to targeted users based on their personal preferences -creating consumer and personal profiles by tracking website history and electronic purchases -compiling data from multiple computer users in order to make predictions about computer trends -gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children? -iris recognition system -hand geometry system -face recognition system -digital forensics system
hand geometry system
Which of the following can transmit germs? -digital forensics systems -iris recognition systems -face recognition systems -hand geometry systems
hand geometry systems
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. -software theft -information theft -decryption -digital forensics
information theft
Which of the following can be used to create a software registration number, sometimes illegally? -keygen -decryption key -BSA -public key
keygen
With a three-generation backup policy, the grandparent is which of the following? -most recent copy of the file -second oldest copy of the file -original file -oldest copy of the file
oldest copy of the file
Which of the following does your financial institution use to reduce fraud? -digital forensics system -signature verification system -iris recognition system -hand geometry system
signature verification system
Which of the following is the least likely motive for a DDoS? -negative recognition -extortion -political anger -spoofing
spoofing
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? -veiling -phishing -spoofing -costuming
spoofing
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? -substitution -expansion -compaction -transposition
substitution
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? -IP -DoS -PGP -TCP
IP
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? -spike -cookie -worm -payload
cookie
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? -cyberextortionist -cyberterrorist -hacker -script kiddie
cyberterrorist
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions? -expansion algorithm -compaction algorithm -Caesar cipher -transposition algorithm
Caesar cipher
In order to safeguard your personal information, which of the following is recommended? -Clear your history file when you are finished browsing -Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them -Use shopping club and buying cards when shopping to remain anonymous -Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase
Clear your history file when you are finished browsing.
Personal computers, display devices, and printers should comply with guidelines of which of the following programs? -ENERGY STAR -ACCEPTABLE USE -SECURE ELECTRONICS -GREEN COMPUTING
ENERGY STAR
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public? -Computer Abuse Amendments Act -COPPA -CAN-SPAM Act -Electronic Communication Privacy Act
Electronic Communication Privacy Act
Which of the following is not a possessed object? -key -PIN -smart card -badge
PIN
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? -They reset the files. -They resource the files. -The index the files. -They restore the files.
They restore the files.
The term CAPTCHA is _____________ -the average time it takes a computer to discover a password based on the number of characters -a series of distorted characters that a user is required to enter correctly to continue using a website -a private combination of words associated with a user name that allows access to computer resources -a digital image used to help decipher a faded or blurry word in digitized news archives
a series of distorted characters that a user is required to enter correctly to continue using a website
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? -a software license -fair use -an IT code of conduct -digital rights management
an IT code of conduct
Which of the following is an authorized person or company that issues and verifies digital certificates? -certificate office -certificate bureau -certificate authority -certificate agency
certificate authority
In your encryption algorithm, you removed every third letter. Which algorithm did you use? -expansion -compaction -transposition -substitution
compaction