Chapter 5 Quizlet

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following best describes a single sign on account?

When you enter your name into one account and you are automatically signed into other accounts and services.

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______. a. use a firewall b. never click OK in a pop-up spyware window c. be cautious when clicking links in email d. always stay connected to the Internet

d. always stay connected to the Internet

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.

engineering

An iris recognition system uses technology to read patterns in the user's _____

eye

Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.

forensics

A(n) ______ was originally a complimentary work for a computer enthusiast.

hacker

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.

lock

Malware is short for ______ software.

malicious

A password ______ is a service that stores all of your account information securely.

manager

PIN stands for personal identification ______.

number

A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.

passphrase

Badges, cards, smart cards, and keys are examples of _____ objects.

possessed

You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

rootkit

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______.

students' educational records

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

worm

Another term for botnet is ______ army.

zombie

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Virus

Encryption is one safeguard against information theft. T/F

True

Piracy is the most common form of software theft. T/F

True

Security experts recommend using different user names and passwords for every account. T/F

True

The website for CERT/CC provides information about Internet security breaches. T/F

True

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie. T/F

True

With CDP, all data is backed up whenever a change is made. T/F

True

You should disable GPS tracking on your mobile device unless you need to use it. T/F

True

A(n) ______ demands payment to stop an attack.

cyberextortionist

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications

Firewall

A(n) ______ backup copies only the files that have changed since the last full backup.

Differential

Content filtering is the process of restricting access to certain material. T/F

True

What is an audit trail?

A file that records access attempts

Which of the following best describes a back door?

A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.

An encryption ______ is a set of steps that converts readable text into unreadable text.

Algorithm

Which of the following is NOT a recommended practice for gaming safety?

Avoid games requiring passwords to be saved to an online account on a smartphone.

You want to ensure your wireless network is secure. Which of the following should you NOT do?

Broadcast the SSID

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

Code of Conduct

An access ______ is a security measure that defines who can access a computer, device, or network.

Control

A(n) ______ has a goal of destroying data or stealing information.

Cracker

What does a keygen do?

Creates software registration numbers.

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.

Distributed

An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?

Emergency Plan

______ is the process of converting data that is readable by humans into encoded characters.

Encryption

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person

Engineering

A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website. T/F

False

Email spoofing rarely is used in virus hoaxes and spam. T/F

False

If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall. T/F

False

Intentionally erasing software is not an example of software theft. T/F

False

Public key encryption is also called asymmetric key encryption. T/F

False

Software used to fight cybercriminals is called crimeware. T/F

False

To protect files on your device's hard drive from hackers, turn on file and printer sharing. T/F

False

Two users can have the same email address. T/F

False

Viruses, worms, and trojan horses replicate themselves to other computers or devices. T/F

False

With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user. T/F

False

Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning. T/F

True

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

Key

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

Passcode is another term for a(n) ______.

PIN

Which of the following is not a green computing recommendation?

Purchase low-efficiency equipment.

In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location

Restore

A(n) ______ often uses prewritten hacking and cracking programs.

Script Kiddie

Employers can use firewalls to restrict employees' access to sensitive data. T/F

True

A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

Site

What should an AUP specify?

The acceptable use of technology by employees for personal reasons

For what purpose was the BSA formed?

To promote understanding of software piracy.

A hand geometry system measures the size and shape of a person's hand. T/F

True

A rootkit can be a backdoor. T/F

True

Common digital security risks include information theft and system failure. T/F

True

Which of the following is NOT true about CAPTCHAs? a. CAPTCHAs were developed to verify input is coming from computer programs, not humans. b. The CAPTCHA text can be read aloud for visually impaired users. c. A CAPTCHA is an image containing a series of distorted characters. d. You have the option of generating a new CAPTCHA

a. CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Which of the following is NOT a part of a typical single-user license agreement? a. You can rent or lease the software. b. You cannot install the software on a network. c. You cannot export the software. d. You can make one copy of the software as a backup.

a. You can rent or lease the software.

Which of the following is NOT true about two-step verification? a. If you sign in from a device you use frequently, you can elect to bypass two-step verification. b. Another term for it is two-factor verification. c. When a system sends an authentication code, it typically does not expire. d. ATMs usually require a two-step verification.

c. When a system sends an authentication code, it typically does not expire.

Which of the following is not recommended to protect against hardware failure?

cables and locks


Ensembles d'études connexes

Ahip 2025 Module 3: Medicare Part D Prescription Drug Coverage

View Set

Washington Life and Health (Disability)

View Set

Digestive Hormones & Important Secretions

View Set

Women's Health/Disorders and Childbearing Health Protection

View Set