Quiz 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Passcode is another term for a(n) ______.

PIN

Which of the following is not a green computing recommendation?

Purchase low-efficiency equipment.

A rootkit can be a backdoor.

True

Common digital security risks include information theft and system failure.

True

Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

True

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

True

Which of the following is NOT a part of a typical single-user license agreement?

You can rent or lease the software.

An encryption ______ is a set of steps that converts readable text into unreadable text.

algorithm

A(n) ______ has a goal of destroying data or stealing information.

cracker

A(n) ______ demands payment to stop an attack.

cyberextortionist

A(n) ______ backup copies only the files that have changed since the last full backup.

differential

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.

distributed

An iris recognition system uses technology to read patterns in the user's ______.

eye

A(n) ______ was originally a complimentary work for a computer enthusiast.

hacker

Malware is short for ______ software.

malicious

A password ______ is a service that stores all of your account information securely.

manager

PIN stands for personal identification ______.

number

A(n) ______ often uses prewritten hacking and cracking programs.

script kiddie

Another term for botnet is ______ army.

zombie

What is an audit trail?

A file that records access attempts

What does a keygen do?

Creates software registration numbers.

Software used to fight cybercriminals is called crimeware.

False

To protect files on your device's hard drive from hackers, turn on file and printer sharing.

False

Two users can have the same email address.

False

With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

False


Ensembles d'études connexes

Evaluate schema theory with reference to research studies

View Set

ACCT 212 Chapter 8: Master Budgeting

View Set

Combo with "The Odyssey Study Guide" and 1 other

View Set