Chapter Review
According to the Ponemon Institute says ___________ Americans saw their identities compromised in 2014.
110 million
Which of the following has the greatest potential for compromising a user's personal privacy?
A group of cookies stored by the user's Web browser
A self-replicating computer program that spreads by sending copies of itself to other computers without the need for other programs to attach to it is what type of program?
A worm
Which of the following best describes a Distributed Denial of Services (DDoS) attack?
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
Which of the following is LEAST likely to indicate a phishing attack?
An email from your bank asks you to call the number on your card to verify a transaction
Which of the following activities poses the greatest personal cybersecurity risk?
Reserving a hotel room by emailing a credit card number to a hotel
Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?
The ability to provide credibility to the information distributed
The "Bring Your Own Device" age has weakened network securities by providing more vulnerabilities.
True
We can no longer count on keeping the hackers out of our networks
True
A computer program that is written to specifically delete, destroy, or otherwise damage a computer if an example of a(n):
Virus
Malicious actors target ____ any device or sensor connected to a network—to break into that network.
Endpoints
According to experts, which of the following are existing vulnerabilities of the Internet?
Eroding the trust and confidence that the general public has in their online privacy and secure online transactions A physical attack that involves cutting fiber-optic cables Attacking electrical systems that control the energy grid
An integrity solution to cybersecurity would act less like alarm and more like a locks.
False
Most companies focus overwhelmingly on encryption and perimeter defense in a post-perimeter world. Their security plans undervalue availability, and rarely address_______.
Integrity
The biggest threat to businesses and governments today is:
Integrity
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?
Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer
Downloading a song from a friend or relative without payment or licensing from the song's author is an example of what?
Piracy
Which of the following is considered an unethical use of computer resources?
Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab
Hackers and malware already have breached their defenses, or soon will is known as
Compromise
Espionage and data theft are threats to
Confidentiality