Chapter Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to the Ponemon Institute says ___________ Americans saw their identities compromised in 2014.

110 million

Which of the following has the greatest potential for compromising a user's personal privacy?

A group of cookies stored by the user's Web browser

A self-replicating computer program that spreads by sending copies of itself to other computers without the need for other programs to attach to it is what type of program?

A worm

Which of the following best describes a Distributed Denial of Services (DDoS) attack?

An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems

Which of the following is LEAST likely to indicate a phishing attack?

An email from your bank asks you to call the number on your card to verify a transaction

Which of the following activities poses the greatest personal cybersecurity risk?

Reserving a hotel room by emailing a credit card number to a hotel

Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?

The ability to provide credibility to the information distributed

The "Bring Your Own Device" age has weakened network securities by providing more vulnerabilities.

True

We can no longer count on keeping the hackers out of our networks

True

A computer program that is written to specifically delete, destroy, or otherwise damage a computer if an example of a(n):

Virus

Malicious actors target ____ any device or sensor connected to a network—to break into that network.

Endpoints

According to experts, which of the following are existing vulnerabilities of the Internet?

Eroding the trust and confidence that the general public has in their online privacy and secure online transactions A physical attack that involves cutting fiber-optic cables Attacking electrical systems that control the energy grid

An integrity solution to cybersecurity would act less like alarm and more like a locks.

False

Most companies focus overwhelmingly on encryption and perimeter defense in a post-perimeter world. Their security plans undervalue availability, and rarely address_______.

Integrity

The biggest threat to businesses and governments today is:

Integrity

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer

Downloading a song from a friend or relative without payment or licensing from the song's author is an example of what?

Piracy

Which of the following is considered an unethical use of computer resources?

Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab

Hackers and malware already have breached their defenses, or soon will is known as

Compromise

Espionage and data theft are threats to

Confidentiality


Ensembles d'études connexes

Chapter 26: The Child with a Cardiovascular Disorder

View Set

CompTIA A+ Certification Exam: Core 1

View Set

Unit 3: Encumbrances on Real Property

View Set

Chapter 46: Management of Patients with Gastric and Duodenal Disorders

View Set

Live Virtual Machine Lab 2.2: Module 02 Organizational Documentation and Procedures

View Set

CS 271 Module 1 Summary Exercises

View Set

Psychology Module 51,52,53 Test (12/5/18)

View Set