Chapter 5 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

which of the following is not a possessed object?

PIN

what is another name for public key encryption?

asymmetric key encryption

which of the following is a program or set of instructions in a program that allows users to bypass security controls?

back door

to read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

digital

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

digital security risk

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

distributed

which of the following laws provides the same protection that covers mail and telephone communications such as voice mail?

electronic communications privacy act (ecpa)

which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

employee monitoring

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

ethical

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

false

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

false

PINs are not the same as passwords.

false

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

false

Programmers often build trapdoors into programs during system development.

false

audit trails record unsuccessful access attempts.

false

biometric objects are entirely foolproof.

false

it is illegal for employers to use software programs that monitor employees.

false

the ecpa protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

false

which of the following copies all of the files in a computer?

full backup

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

malware

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

network

which of the following terms means in a location separate from the computer site?

off-site

With a three-generation backup policy, the grandparent is which of the following?

oldest copy of the file

which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddle

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

site

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

password

which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

phishing

in the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

they restore the files

Any illegal act involving a computer generally is referred to as a computer crime.

true

If a company does not have a formal email policy, it can read email messages without employee notification.

true

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

true

a digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

true

a rootkit can be a back door?

true

any device that connects to the internet is susceptible to mobile malware.

true

digital signatures often are used to ensure that an imposter is not participating in an internet transaction.

true

many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network?

true

some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer?

true

the PATRIOT act gives law enforcement the right to monitor people's activities, including web and email habits.

true

to remove spyware, users need to obtain a special program that can detect and delete it.

true


Ensembles d'études connexes

PNU 133 Honan PrepU Teaching & Learning / Patient Education

View Set

Complex Care: Order of Importance

View Set

Marketing Final Practice Exam w/answers

View Set

theology 3b- morality- section 1; part 3 review

View Set

Volume of rectangular prisms & cylinders

View Set