13b Test 6-7 over Module 6,7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?

.xlsx

Which of the following is an example of user authentication?

A user enters a matching user name and password combination.

There are various encryption methods, but the encryption standard currently used worldwide is _____.

AES (Advanced Encryption Standard)

Spoofing an address to redirect LAN traffic through a secondary, malicious device by altering the LAN's routing table is known as _____ address spoofing.

ARP

What defense does your browser provide to protect against MITM (Man In The Middle) attacks?

Alert that the encryption certificate is invalid

Which of the following tasks is part of the process for installing software on a PC?

Allow the setup program to run.

The download page at https://musescore.org/en says this software is free. This means:

Although it is copyrighted, you may use it without payment

A feature of macOS that should be disabled is:

Automatic login

If a hacker is trying every possible combination of characters to guess your password, this is termed:

Brute force attack

When antivirus software detects malware, which of the following would not be a course of action you could take to resolve the problem?

Conduct a heuristic analysis.

Which type of attack can be used to flood a Web site with so much traffic that it can no longer provide its intended service?

DDoS

A software application you are about to download for your Mac computer most likely has a _______ extension on the file.

DMG

What should you do if you suspect malware has invaded your computer undetected, but a subsequent update of the antivirus database has it listed?

Do a manual scan

A what-if analysis that you could perform using spreadsheet software would be useful for answering the question "_____."

How will it affect the total I pay for my car if I pay an extra $100 per month on my car loan?

Roy works for law enforcement and is investigating a criminal organization. What technology can he use to monitor text messages and data streams sent from mobile devices in a specific area?

IMSI catcher

Darlene signs up for an account at an ecommerce site and is asked to create a password of five characters that are either numbers or lower-case letters. She recognizes that based on these requirements, her password will be one of _____ possible passwords.

IT ISN"T "365"

Which of the following is not a characteristic of a weak password?

It is eight characters in length and includes one or more uppercase letters, numbers, and symbols.

While waiting to change airplanes in Denver, you check the available WiFi connections in the lobby. What would be your first clue that one of them is an Evil Twin?

It is unsecured (does not use a password)

The reason our textbook does not recommend use of the Windows Hello PIN is:

Limited security of a 4-digit password

Which operating system is open source and available as distros, such as Ubuntu and Mint?

Linux

Which OS is installed on about 75% of the world's personal computers?

Microsoft Windows

Which of the following copies of a piece of software would be illegal unless allowed by the license?

Multiple copies to be used for non-commercial purposes only

Corporate IT has warned you that a newly-discovered RAT is using port 2719 to communicate with the malware author's server in Moldova. What tool could you use to determine if your computer has been infected?

NETSTAT

Microsoft Word has a spelling dictionary it uses to help you type words correctly. If you use the wrong word but spell it correctly, what happens?

Nothing - you've made an error!

Toolbars and alternative default browsers are the most common types of _____.

PUPs

Cassandra is organizing her application launch icons by category. Which icon or set of icons does not belong in the productivity software category?

Parallels Desktop

Goldwave uses the "demoware" licensing model. Their software is free to download onto your computer. It is fully functional, but only works for a certain number of mouse clicks before it stops working until you:

Pay a license fee to unlock it

Karen needs an application for her business (designing and making instruments such as flutes out of glass), but she is concerned about the payment system at their online portal where she must download the application. The textbook's suggestion as an alternative to entering her credit card information would be:

Paypal

What technology is used by hackers for most online intrusions?

RAT (Remote access trojan)

What service offered by Google checks URLs against a list of suspicious Web site URLs?

Safe Browsing

Janelle would like to install the free BBC News mobile app on her iPhone. What should she do?

She should select the app at the app store and touch the Download button.

Which statement is a best practice for digital file management?

Store data files in separate folders from program files.

Which of the following statements about macOS is true?

The OS kernel of macOS is based on UNIX.

Which statement about digital file management tools is correct?

The file management utilities for Windows and Mac share similar functions, features, and layouts.

When you empty the Recycle Bin on your computer, what happens?

The index file marks the sectors as available for storing new data.

Under what condition might an anti-virus software fail to detect a malware item?

The malware item is not yet listed in the anti-virus' database

When you downloaded a software package last year, you made a one-time payment to get a license with no end date. Now they are telling you that it will cost you $50 to make it current. What's going on?

The new software version coming out has additional features

Xander is at Los Angeles International Airport, a place with excellent cell phone coverage. Police, fearing a terrorist action, have deployed an IMSI catcher to gain control of cell phone traffic. What would Xander see on his phone that would indicate this has happened?

The phone shows 2G

What is the most common type of PUP (Potentially unwanted program) or PUA (Potentially unwanted application)?

Toolbar or alternative browser

Which of the following would not be considered an operating system resource?

URL (Uniform Resource Locator)

Which of the following would be good to put on your list of rules for a good password?

Use uppercase letters somewhere other than the beginning of the password

In order to run Microsoft Windows on a Mac Book Pro, you'll need to either set your device up as dual-boot or install Windows as a(n):

Virtual machine

Keymoni's electrical services company has an office with a local area network, and his technicians both use their laptops in the office and take them along when they make service calls. Why should Keymoni ensure that each laptop has a personal firewall installed and properly configured?

Without personal firewalls, one laptop could spread malware to the other laptops while they are connected to the office LAN.

If you want to be able to make traditional telephone calls on a Windows 11 computer, you will need:

a tablet equipped with a SIM slot for cellular calling

When you are working with spreadsheet software, an absolute reference is required for a formula that _____.

adds a fixed processing charge to each price

Velma receives an email from a stranger who claims he will be receiving a large inheritance soon and will share it with her in exchange for a loan to help him escape his current financial difficulties. He requests that Velma allow him to pay his creditors from her bank account. Velma deletes the email because she recognizes that it represents _____.

advance fee fraud

A procedure for encryption or decryption is called a cryptographic _____.

algorithm

Mollie is using her browser to access a Web site with a URL beginning with HTTPS. She types in the home page's search box and clicks a button to initiate a search. Mollie's browser sends a request to the server that hosts the Web site _____.

and then that server sends the browser an encryption key with which to encrypt data

What spreadsheet software feature ensures that the results in every cell are accurate for the information currently entered in the worksheet?

automatic recalculation

To name files following cross-platform best practices, you should _____.

avoid using reserved words such as Aux or Nul

What is the best (perhaps the only) defense against ransomware?

backups

A router using network address translation contributes to digital security by _____.

blocking connections that are not initiated inside the local network

Which of the following would be considered essential software for both laptop computers and tablet computers?

browser

If you type into your computer faster than it can process the information (because it is also doing other things or what you are typing requires major work like re-formatting the screen), the computer won't lose what you were typing because it was kept in a(n):

buffer

Each point in a presentation may be shown in a list punctuated by _____________.

bullets

Stuxnet was one of the first computer malware weapons used by one country against another. What specific piece of enemy hardware was it designed to disable?

centrifuge

Which category of software would programming languages fall into?

development software

A server's credentials, an encryption key, and a signature from a security authority are the components of a(n) _____.

digital certificate

Who or what detects and corrects pharming attacks which spoof DNS?

domain registrars

The measure in bits of a password's unpredictability is termed password ___________________:

entropy

What scanning option should NOT be chosen when configuring an anti-virus?

exclusions

A(n) ___________________ file contains a computer program that is carried out step by step within the microprocessor.

executable

In a database, an individual piece of data (such as the birthday, in a database used to keep track of people) is termed:= a(n):

field

The feature of a spreadsheet worksheet that works behind the scenes to tell the microprocessor how to use the contents of cells in calculations is a _____.

formula

Imagine that one of your friends shares his plan for making some extra money by reselling public domain software. You correctly comment that _____.

he can legally resell the software but cannot apply for a copyright on it

Which type of spam filter can help detect falsified information, such as spoofed IP addresses?

header

Antivirus software can detect malware by analyzing the characteristics and behavior of suspicious files using techniques called _____.

heuristic analysis

Apple's mobile operating system is named:

iOS

The iOS operating system is found on which device?

iPhone

A Local Application:

is installed on your devices hard disk or other storage device

Chrome OS is considered a thin client because _____.

it depends substantially on processing and storage provided by a remote computer

What is a zero-day attack?

malware that has not yet been discovered by antivirus companies

Address spoofing, IMSI catchers, and Evil Twins are examples of which category of exploit?

man-in-the-middle

In a device with multi-core processors or multiple processors, an operating system supports a division of labor among all the processing units with its _____ capability.

multiprocessing

Harold, a Java programmer, downloads an open-source timesheet application under the General Public License (GPL). He modifies the app's source code to add some new features that he finds especially handy. He would like to make his enhanced version of the app available to other users. Harold _____.

must distribute the modified timesheet app under the General Public License

If you suspect that your computer might be infected by a zero-day exploit, you might be able to identify the infection by using a product such as Malwarebytes to launch a(n) _____.

on-demand scan

When an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software, a(n) _____ occurs.

online intrusion

Which type of software must include the source code, which allows programmers to modify and improve the software?

open source

Emily is preparing a spreadsheet to make available for her bank's customers to download, so they can figure out the size of payments for loans they might consider getting from the bank. But the calculation of a loan payment is an involved formula. Instead of typing in that formula, she'll probably use the spreadsheet's:

payment function

The microprocessor receives commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices. These various activities are called _____.

processes

The Windows _____________________ is a database that keeps track of a PC's peripheral devices, software, preferences, and settings.

registry

Victor receives a link to a news article from a friend in an email message. He clicks the link, and just after he begins reading the article, a dialog box appears: "Warning! Your computer may be infected with spyware. To scan your computer for such infections, click OK below." Victor ignores this warning because he recognizes it as a(n) _____ exploit.

rogue antivirus

The main directory on a storage device is referred to as the ________ directory.

root

Trevor has a folder on his computer that contains 250 files. He wishes to move 38 of them to another folder. So he brings up both folders on his desktop. In order to avoid dragging each file individually, he could __________________ the files he wants to move and then drag them as a group.

select

Brent installs a personal firewall on his laptop. A few weeks later, he purchases a new software application from a trusted source. When Brent begins using this new application, a dialog box appears stating that the app is attempting to establish a connection and asking him to choose whether to allow or block the app. Brent should _____.

select "Allow" so that his app will be added to his firewall's list of allowed exceptions

A font is a(n):

set of letters that share a unified design

What is the process of installing an app from a source other than an official app store on a device called?

side-loading

Which type of software license is generally priced at a flat rate and allows software to be used on all computers at a specific location?

site license

A person who devises and carries out a scam in order to accomplish a goal is called a(n) _____.

social engineer

A deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest is called _____.

social engineering

Which type of exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites?

spear phishing

Which of the following is not a characteristic of a computer worm?

spread through a process called side-loading

An operating system's index file _____.

stores information regarding which hard drive clusters are empty

Shaquinta is browsing the App Store when an app called Dandelion Inc catches her eye because she regularly shops at the Dandelion Clothing retail store. However, when Shaquinta examines the full profile for the app, she quicky recognizes it as a fake app because _____.

the app's publisher is listed as Magrada Holdings, whereas the store's Web site belongs to Dandelion Clothing Company

Lynn's smartphone is in Airplane mode during a long flight. Lynn attempts to use a restaurant search app, but it doesn't operate properly—she can't view any restaurant information. However, when she opens her e-book app, she is able to resume reading the novel she started in the terminal with no problems. This suggests that _____.

the restaurant search app is a hybrid app, whereas the e-book app is a mobile app

To increase security by verifying identity based on more than just a password or PIN, an organization can implement _____.

two-factor authentication

What is the best way to protect your computer against a rogue antivirus?

use legitimate antivirus software

Which of the following usually arrives as an email message that contains warnings about a dangerous computer virus that in fact does not exist?

virus hoax

In a word processor application, whether your text flows from line to line by automatically moving words down to the next line as you reach the right margin is determined by a feature called _____.

word wrap

When you use a password manager to store passwords locally, this means that _____.

your passwords will be tied to the device on which they are created


Ensembles d'études connexes

Intermediate Accounting Chapter 15

View Set

Chapter 21 Learnsmart Assignment

View Set

wgu stats module 5- statistics with 2 variables

View Set

Missouri State Portion: Educational Requirements

View Set