E. Technology 5
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service
voice verification system
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Backup
Type of hacker who intends serious harm through espionage, theft, or disruption of a network
Black Hat
Computer taken over by hackers to perform malicious tasks across a network What is the term for a program that performs a repetitive task on a network
Bot
In order to safeguard your personal information, which of the following is recommended
Clear your history file when you are finished browsing
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons
Components of an online profile
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate
Digital
Items an identity thief can obtain to impersonate you
Driver's license, birth certificate
Computer Generation
First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer
Common forms include computer viruses, Trojan horses, and worms
Malware
First step to take when being cyberbullied or cyberstalked
Report abuse quickly
Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission Internet advertising firms often use which of the following to collect information about users web browsing habits
Spyware
Which of the following statements is not true about intellectual property rights
The term fair use refers to the rights which creators are entitled for their work
True or False
True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it's lost.
Type of hacker who wants to show off their skills and doesn't intend any serious damage
White Hat
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them
information privacy
One secure method of online payment
electronic wallet
Indication that a Web site is secure for shopping
https://
Type of malware that collects bits of data, like your surfing habits
spyware
True
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages
Displays unwanted advertisements in banners or pop-up windows on your computer
Adware
Used by commercial Web site vendors to identify users and customize Web pages
Cookie
False
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Digital Security risk
Unless you want to allow others to follow your locations throughout the day, disable the
GPS
The nation's fastest growing crime, where victims are unaware it's being committed until the damage is done
Identity theft
What occurs when someone steals personal or confidential information
Information theft
Legal or Illegal
Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source
A set of online communication practices and rules
Netiquette
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Spoofing
True or False
True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender
a digital signature
The term back door, as it refers to computer crime, is
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
a rootkit
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
a worm
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts
an audit trail
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program
clickjacking
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action
cracker
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
cyberterrorism
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks
digital forensics
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited
employee monitoring
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following
ethical
Which of the following does your college use to verify your identity
hand geometry system
Events that account for almost half of total catastrophic data losses
hurricanes and storms
Indication that a Web site is not secure
misspelled company name
Online payment method to avoid
money transfer
Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information
phishing
A slowed down Wi-Fi connection can be the result of this
piggybacking
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process
product activation
Type of power supply/battery backup device that can prevent some forms of data loss
uninterruptible
Type of malware that is spread when you distribute infected files, especially as e-mail attachments
virus
Type of malware that spreads without human interaction, sending itself out to everyone in your address book
worm