EXERCISE MODULE 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

emergency plan

An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?

zombie

Another term for botnet is army

digital security risk

Any event or action that could cause a loss of or damage to computer or mobile device hardware

possessed

Badges, cards, smart cards, and keys are examples of objects

spoofing

IP_________________occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

It is secure.

If the web address of a website begins with https instead of http, what do you know about the website?

restore

In case of system failure or the discovery of corrupted files, you files by copying backed up files to their original location.

ciphertext

In the encryption process, the encrypted (scrambled) data

plaintext

In the encryption process, the unencrypted, readable data

malicious

Malware is short for software

AUP

Outlines the activities for which a computer or network may and may not be used

number

PIN stands for personal identification

PIN

Passcode is another term for a(n)

firewall

Protects a network's resources from intrusion

engineering

Social is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person

payload

The destructive event or prank a malware delivers is its

zombie

The owner of this kind of computer is unaware that it is being controlled remotely by an outsider

cybercrime

The term refers to online or Internet-based illegal acts.

piracy

The unauthorized and illegal duplication of copyrighted software

True

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

Creates software registration numbers

What does a keygen do?

A file that records access attempts.

What is an audit trail?

The acceptable use of technology by employees for personal reasons.

What should an AUP specify?

distributed

When a botnet is used to attack computers or networks, it is called a(n) DoS attack

When you enter your name into one account and you are automatically signed into other accounts and services.

Which of the following best describes a single sign on account?

You can rent or lease the software.

Which of the following is NOT a part of a typical single-user license agreement?

Look for games that use ActiveX or JavaScript, as these are always safe.

Which of the following is NOT a recommended practice for gaming safety?

cables and locks

Which of the following is NOT recommended to protect against hardware failure?

CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Which of the following is NOT true about CAPTCHAs?

students' educational records

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

rootkit

You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

worm

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

firewall

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal , a program that protects your computer from unauthorized access by blocking certain types of communications.

Broadcast the SSID

You want to ensure your wireless network is secure. Which of the following should you NOT do?

Encryption

is the process of converting data that is readable by humans into encoded characters.

always stay connected to the Internet

ou recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT

True

true or false A hand geometry system measures the size and shape of a person's hand

True

true or false A rootkit can be a backdoor.

False

true or false A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website

True

true or false Common digital security risks include information theft and system failure.

True

true or false Content filtering is the process of restricting access to certain material.

True

true or false Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

False

true or false Email spoofing rarely is used in virus hoaxes and spam.

True

true or false Employers can use firewalls to restrict employees' access to sensitive data.

True

true or false Encryption is one safeguard against information theft

False

true or false If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall

False

true or false Intentionally erasing software is not an example of software theft.

False

true or false Passphrases are less secure than passwords.

True

true or false Piracy is the most common form of software theft.

False

true or false Public key encryption is also called asymmetric key encryption

True

true or false Security experts recommend using different user names and passwords for every account.

False

true or false Software used to fight cybercriminals is called crimeware.

True

true or false The website for CERT/CC provides information about Internet security breaches.

False

true or false To protect files on your device's hard drive from hackers, turn on file and printer sharing.

False

true or false Two users can have the same email address.

True

true or false User IDs are also called user names, log on names, or sign in names.

False

true or false Viruses, worms, and trojan horses replicate themselves to other computers or devices.

True

true or false With CDP, all data is backed up whenever a change is made.

False

true or false With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

True

true or false You should disable GPS tracking on your mobile device unless you need to use it.

script kiddie

Hacker who usually does not have advanced computer and technical skills

certificate

A digital is a notice that guarantees a user or website is legitimate.

botnet

A group of compromised computers

digital certificate

A notice that guarantees a user or a website is legitimate

manager

A password is a service that stores all of your account information securely.

bot

A program that performs a repetitive task on a network

clickjacking

A scam in which a button or link on a website contains a malicious program

site

A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

differential

A(n) backup copies only the files that have changed since the last full backup

cyberextortionist

A(n) demands payment to stop an attack

cracker

A(n) has a goal of destroying data or stealing information

virus

A(n) is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission

password

A(n) is a private combination of characters associated with a user name that allows access to certain computer resources.

passphrase

A(n) is a private combination of words associated with a user name that allows access to certain computer resources.

bot

A(n) is a program that performs a repetitive task on a network.

code of conduct

A(n) is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

script kiddie

A(n) often uses prewritten hacking and cracking programs

lock

A(n) screen restricts access to a computer or mobile device until a user performs a certain action

voice

A(n) verification system compares a person's live speech with their stored speech pattern.

hacker

A(n) was originally a complimentary work for a computer enthusiast

control

An access is a security measure that defines who can access a computer, device, or network.

DoS attack

An assault whose purpose is to disrupt computer access to an Internet service

CA

An authorized person or company that issues and verifies digital certificates

digital signature

An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

key

An encryption is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

algorithm

An encryption is a set of steps that converts readable text into unreadable text

eye

An iris recognition system uses technology to read patterns in the user's

forensics

Digital is the discovery, collection, and analysis of evidence found on computers and networks.

biometric

Fingerprint readers are examples of devices.

To promote understanding of software piracy.

For what purpose was the BSA formed?


Ensembles d'études connexes

TExES Core Subjects EC-6 (291): Science

View Set

Present Perfect with 'for' and 'since'

View Set

Glosario de términos geográficos para las pruebas de acceso a la universidad

View Set

Patho Quiz 4- Ch 43, 45 practice question

View Set

Chapt 39 Nursing Care of the Child with Communicable Disease

View Set

Chemistry ch. 1Matter and Change

View Set

Chapter 1: Physical Fitness and Wellness

View Set

Advantages/ disadvantages of franchising

View Set