13b Test 6-7 over Module 6,7
Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet?
.xlsx
Which of the following is an example of user authentication?
A user enters a matching user name and password combination.
There are various encryption methods, but the encryption standard currently used worldwide is _____.
AES (Advanced Encryption Standard)
Spoofing an address to redirect LAN traffic through a secondary, malicious device by altering the LAN's routing table is known as _____ address spoofing.
ARP
What defense does your browser provide to protect against MITM (Man In The Middle) attacks?
Alert that the encryption certificate is invalid
Which of the following tasks is part of the process for installing software on a PC?
Allow the setup program to run.
The download page at https://musescore.org/en says this software is free. This means:
Although it is copyrighted, you may use it without payment
A feature of macOS that should be disabled is:
Automatic login
If a hacker is trying every possible combination of characters to guess your password, this is termed:
Brute force attack
When antivirus software detects malware, which of the following would not be a course of action you could take to resolve the problem?
Conduct a heuristic analysis.
Which type of attack can be used to flood a Web site with so much traffic that it can no longer provide its intended service?
DDoS
A software application you are about to download for your Mac computer most likely has a _______ extension on the file.
DMG
What should you do if you suspect malware has invaded your computer undetected, but a subsequent update of the antivirus database has it listed?
Do a manual scan
A what-if analysis that you could perform using spreadsheet software would be useful for answering the question "_____."
How will it affect the total I pay for my car if I pay an extra $100 per month on my car loan?
Roy works for law enforcement and is investigating a criminal organization. What technology can he use to monitor text messages and data streams sent from mobile devices in a specific area?
IMSI catcher
Darlene signs up for an account at an ecommerce site and is asked to create a password of five characters that are either numbers or lower-case letters. She recognizes that based on these requirements, her password will be one of _____ possible passwords.
IT ISN"T "365"
Which of the following is not a characteristic of a weak password?
It is eight characters in length and includes one or more uppercase letters, numbers, and symbols.
While waiting to change airplanes in Denver, you check the available WiFi connections in the lobby. What would be your first clue that one of them is an Evil Twin?
It is unsecured (does not use a password)
The reason our textbook does not recommend use of the Windows Hello PIN is:
Limited security of a 4-digit password
Which operating system is open source and available as distros, such as Ubuntu and Mint?
Linux
Which OS is installed on about 75% of the world's personal computers?
Microsoft Windows
Which of the following copies of a piece of software would be illegal unless allowed by the license?
Multiple copies to be used for non-commercial purposes only
Corporate IT has warned you that a newly-discovered RAT is using port 2719 to communicate with the malware author's server in Moldova. What tool could you use to determine if your computer has been infected?
NETSTAT
Microsoft Word has a spelling dictionary it uses to help you type words correctly. If you use the wrong word but spell it correctly, what happens?
Nothing - you've made an error!
Toolbars and alternative default browsers are the most common types of _____.
PUPs
Cassandra is organizing her application launch icons by category. Which icon or set of icons does not belong in the productivity software category?
Parallels Desktop
Goldwave uses the "demoware" licensing model. Their software is free to download onto your computer. It is fully functional, but only works for a certain number of mouse clicks before it stops working until you:
Pay a license fee to unlock it
Karen needs an application for her business (designing and making instruments such as flutes out of glass), but she is concerned about the payment system at their online portal where she must download the application. The textbook's suggestion as an alternative to entering her credit card information would be:
Paypal
What technology is used by hackers for most online intrusions?
RAT (Remote access trojan)
What service offered by Google checks URLs against a list of suspicious Web site URLs?
Safe Browsing
Janelle would like to install the free BBC News mobile app on her iPhone. What should she do?
She should select the app at the app store and touch the Download button.
Which statement is a best practice for digital file management?
Store data files in separate folders from program files.
Which of the following statements about macOS is true?
The OS kernel of macOS is based on UNIX.
Which statement about digital file management tools is correct?
The file management utilities for Windows and Mac share similar functions, features, and layouts.
When you empty the Recycle Bin on your computer, what happens?
The index file marks the sectors as available for storing new data.
Under what condition might an anti-virus software fail to detect a malware item?
The malware item is not yet listed in the anti-virus' database
When you downloaded a software package last year, you made a one-time payment to get a license with no end date. Now they are telling you that it will cost you $50 to make it current. What's going on?
The new software version coming out has additional features
Xander is at Los Angeles International Airport, a place with excellent cell phone coverage. Police, fearing a terrorist action, have deployed an IMSI catcher to gain control of cell phone traffic. What would Xander see on his phone that would indicate this has happened?
The phone shows 2G
What is the most common type of PUP (Potentially unwanted program) or PUA (Potentially unwanted application)?
Toolbar or alternative browser
Which of the following would not be considered an operating system resource?
URL (Uniform Resource Locator)
Which of the following would be good to put on your list of rules for a good password?
Use uppercase letters somewhere other than the beginning of the password
In order to run Microsoft Windows on a Mac Book Pro, you'll need to either set your device up as dual-boot or install Windows as a(n):
Virtual machine
Keymoni's electrical services company has an office with a local area network, and his technicians both use their laptops in the office and take them along when they make service calls. Why should Keymoni ensure that each laptop has a personal firewall installed and properly configured?
Without personal firewalls, one laptop could spread malware to the other laptops while they are connected to the office LAN.
If you want to be able to make traditional telephone calls on a Windows 11 computer, you will need:
a tablet equipped with a SIM slot for cellular calling
When you are working with spreadsheet software, an absolute reference is required for a formula that _____.
adds a fixed processing charge to each price
Velma receives an email from a stranger who claims he will be receiving a large inheritance soon and will share it with her in exchange for a loan to help him escape his current financial difficulties. He requests that Velma allow him to pay his creditors from her bank account. Velma deletes the email because she recognizes that it represents _____.
advance fee fraud
A procedure for encryption or decryption is called a cryptographic _____.
algorithm
Mollie is using her browser to access a Web site with a URL beginning with HTTPS. She types in the home page's search box and clicks a button to initiate a search. Mollie's browser sends a request to the server that hosts the Web site _____.
and then that server sends the browser an encryption key with which to encrypt data
What spreadsheet software feature ensures that the results in every cell are accurate for the information currently entered in the worksheet?
automatic recalculation
To name files following cross-platform best practices, you should _____.
avoid using reserved words such as Aux or Nul
What is the best (perhaps the only) defense against ransomware?
backups
A router using network address translation contributes to digital security by _____.
blocking connections that are not initiated inside the local network
Which of the following would be considered essential software for both laptop computers and tablet computers?
browser
If you type into your computer faster than it can process the information (because it is also doing other things or what you are typing requires major work like re-formatting the screen), the computer won't lose what you were typing because it was kept in a(n):
buffer
Each point in a presentation may be shown in a list punctuated by _____________.
bullets
Stuxnet was one of the first computer malware weapons used by one country against another. What specific piece of enemy hardware was it designed to disable?
centrifuge
Which category of software would programming languages fall into?
development software
A server's credentials, an encryption key, and a signature from a security authority are the components of a(n) _____.
digital certificate
Who or what detects and corrects pharming attacks which spoof DNS?
domain registrars
The measure in bits of a password's unpredictability is termed password ___________________:
entropy
What scanning option should NOT be chosen when configuring an anti-virus?
exclusions
A(n) ___________________ file contains a computer program that is carried out step by step within the microprocessor.
executable
In a database, an individual piece of data (such as the birthday, in a database used to keep track of people) is termed:= a(n):
field
The feature of a spreadsheet worksheet that works behind the scenes to tell the microprocessor how to use the contents of cells in calculations is a _____.
formula
Imagine that one of your friends shares his plan for making some extra money by reselling public domain software. You correctly comment that _____.
he can legally resell the software but cannot apply for a copyright on it
Which type of spam filter can help detect falsified information, such as spoofed IP addresses?
header
Antivirus software can detect malware by analyzing the characteristics and behavior of suspicious files using techniques called _____.
heuristic analysis
Apple's mobile operating system is named:
iOS
The iOS operating system is found on which device?
iPhone
A Local Application:
is installed on your devices hard disk or other storage device
Chrome OS is considered a thin client because _____.
it depends substantially on processing and storage provided by a remote computer
What is a zero-day attack?
malware that has not yet been discovered by antivirus companies
Address spoofing, IMSI catchers, and Evil Twins are examples of which category of exploit?
man-in-the-middle
In a device with multi-core processors or multiple processors, an operating system supports a division of labor among all the processing units with its _____ capability.
multiprocessing
Harold, a Java programmer, downloads an open-source timesheet application under the General Public License (GPL). He modifies the app's source code to add some new features that he finds especially handy. He would like to make his enhanced version of the app available to other users. Harold _____.
must distribute the modified timesheet app under the General Public License
If you suspect that your computer might be infected by a zero-day exploit, you might be able to identify the infection by using a product such as Malwarebytes to launch a(n) _____.
on-demand scan
When an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software, a(n) _____ occurs.
online intrusion
Which type of software must include the source code, which allows programmers to modify and improve the software?
open source
Emily is preparing a spreadsheet to make available for her bank's customers to download, so they can figure out the size of payments for loans they might consider getting from the bank. But the calculation of a loan payment is an involved formula. Instead of typing in that formula, she'll probably use the spreadsheet's:
payment function
The microprocessor receives commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices. These various activities are called _____.
processes
The Windows _____________________ is a database that keeps track of a PC's peripheral devices, software, preferences, and settings.
registry
Victor receives a link to a news article from a friend in an email message. He clicks the link, and just after he begins reading the article, a dialog box appears: "Warning! Your computer may be infected with spyware. To scan your computer for such infections, click OK below." Victor ignores this warning because he recognizes it as a(n) _____ exploit.
rogue antivirus
The main directory on a storage device is referred to as the ________ directory.
root
Trevor has a folder on his computer that contains 250 files. He wishes to move 38 of them to another folder. So he brings up both folders on his desktop. In order to avoid dragging each file individually, he could __________________ the files he wants to move and then drag them as a group.
select
Brent installs a personal firewall on his laptop. A few weeks later, he purchases a new software application from a trusted source. When Brent begins using this new application, a dialog box appears stating that the app is attempting to establish a connection and asking him to choose whether to allow or block the app. Brent should _____.
select "Allow" so that his app will be added to his firewall's list of allowed exceptions
A font is a(n):
set of letters that share a unified design
What is the process of installing an app from a source other than an official app store on a device called?
side-loading
Which type of software license is generally priced at a flat rate and allows software to be used on all computers at a specific location?
site license
A person who devises and carries out a scam in order to accomplish a goal is called a(n) _____.
social engineer
A deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest is called _____.
social engineering
Which type of exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites?
spear phishing
Which of the following is not a characteristic of a computer worm?
spread through a process called side-loading
An operating system's index file _____.
stores information regarding which hard drive clusters are empty
Shaquinta is browsing the App Store when an app called Dandelion Inc catches her eye because she regularly shops at the Dandelion Clothing retail store. However, when Shaquinta examines the full profile for the app, she quicky recognizes it as a fake app because _____.
the app's publisher is listed as Magrada Holdings, whereas the store's Web site belongs to Dandelion Clothing Company
Lynn's smartphone is in Airplane mode during a long flight. Lynn attempts to use a restaurant search app, but it doesn't operate properly—she can't view any restaurant information. However, when she opens her e-book app, she is able to resume reading the novel she started in the terminal with no problems. This suggests that _____.
the restaurant search app is a hybrid app, whereas the e-book app is a mobile app
To increase security by verifying identity based on more than just a password or PIN, an organization can implement _____.
two-factor authentication
What is the best way to protect your computer against a rogue antivirus?
use legitimate antivirus software
Which of the following usually arrives as an email message that contains warnings about a dangerous computer virus that in fact does not exist?
virus hoax
In a word processor application, whether your text flows from line to line by automatically moving words down to the next line as you reach the right margin is determined by a feature called _____.
word wrap
When you use a password manager to store passwords locally, this means that _____.
your passwords will be tied to the device on which they are created