BCIS-EXAM 3
Digital rights management (DRM) is a system of access control that allows unlimited use of the material
False
Digital signals are continuous
False
Encrypting data is not an appropriate measure for mobile devices such as smartphones
False
Instant messaging is secure because of the type of encryption used
False
Plagiarism is illegal in the United States.
False
Which of the following is not a category of intellectual property?
Impression
which of the following is a digital video file format?
MPEG-4
Copyright a movie and giving it to a friend is not fair use
True
Copyright lasts for the life of the creator plus 70 years in the United States
True
Network adapters perform specific tasks to enable nodes to communicate on a network
True
Switches are used to send data on a specific route through an internal network.
True
Your Internet service provider has a default DNS server to translate a URL into an IP address.
True
Your social security number should never be shared on a website, in an email, or through messaging.
True
encryption virus
a program that renders your computer files unusable by compressing them
It is important to maintain your online reputation
all of the above
trademark
allows McDonalds to protect its logo
Digital Rights Management
allows only limited use of legally purchased materials
fair use
allows people to use portions of copyrighted work for specific purposes
black hat hacker
an unethical hacker
Which server would a client/server network include to allows users to share software?
application
DHCP
assigns users IP addresses for the duration of a session
worm
attempts to travel between systems through network connections to spread an infection
The process whereby users prove they have authorization to is a computer network is known as
authentication
Which is NOT a key component of a typical client/server network?
bastion host
Authentication techniques that rely on personal biological traits are called
biometrics
Viruses that load from USB drives left connected to computers when computers are turned on are known as
boot-sector viruses
Encryption is used to
code your e-mail so only one person can decipher it
web
delivers HTML documents on request
The combination of media, internet, entertainment, and phone services into a single device illustrates the principal of
digital Convergence
When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.
digitizing
commerce
enables users to purchase items over the internet
*Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.*
engineering
Which of the following is an area of an intranet that only certain corporations or individuals can access
extranet
*Reproduction by a teacher or student of small part of a work to illustrate a lesson is commonly known as educational____ use*
fair
Using copyrighted works without permission of the copyright holder is possible under the __ doctrine
fair use
A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as
fake news
Which network cable type is virtually immune to signal interference?
fiber-optic
gray-hat hacker
flaunts expertise to the administrator of a system
Copyleft
granting of certain rights to a work while retaining other rights
*A(n)___ hat hacker illegally penetrates a system simply to demonstrate the hacker's experience to the system administrator*
grey
Which of the following is NOT one of the factors used in multi factor authentication?
identity
Hackers
illegally break into a computer or network
Antiviruses software prevents infection by recording key attributes about your files and checking to see if they change over time in process called
inoculation
The collection of large national and international networks used to establish the internet is called the
internet backone
A packet analyzer is called a sniffer because
it captures and reads data inside each packet.
increasing the sampling rate when digitizing a file has which effect on the file
it increases the file size
HTTPS is different than HTTP because
it is a combination of HTTP and the Secure Sockets Layer (SSL)
The DNS server
lets you look up an IP address from a domain name
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation (NAT)
sampling rate
number of times an analog wave is measured
*Illegally used copyrighted software is known as software ___*
piracy or copyright infringement
TCP
prepares dat for transmission providing for error checking and resending lost data
Computer virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
DHCP
protocol that assigns dynamic IP address
Ransomware as a Service has allowed the increase of
ransomware attacks
*Your online__ consist of the information available about you in cyberspace that can influence people's opinions of you in the real world*
reputation
A __ is a program that takes complete control of your computer without your knowledge
rootkit
a surge protector may look like another power strip but it also can
save your device if a voltage spike is sent through electrical system
On a client/server networks more users can be added without affecting the performance of other nodes. This is known as network
scalability
SMTP is the set of rules used to
send e-mail along the Internet to its destination
IP
sends data between computers on the internet
Which of the following is an advantage installing a client/server network in a business?
sharing of peripherals
multifactor authentication requires you to have a combination of
something you know something you are and something you own
specifically deal with the SMTP communication method
Which topology is most widely used today?
star
Social Engineering
techniques used to manipulate people into performing actions and divulging confidential information
which of the following does NOT determine the quality of a digital image e
the number of pixels in the camera lens
A private key is important
to decode an encrypted message
HTTP
transfer data from servers to browsers
DNS
translates domain names into IP addresses
MIME is the protocol that supports sending files as e-mail attachments
true
Virtual private networks make it just as secure to send information across a public network as it is on a secure private network
true
sending emails to lure people to reveal personal information is a technique known as phishing
true
SMTP
used for transmission of email messages across the internet
cyberloafing
using an employer's computer for non-work activities
polymorphic virus
virus that changes its own code to avoid detection
logic bomb
virus that is triggered when certain conditions are met
The internet is primarily funded by
your federal income taxes
white hat hacker
An ethical hacker
CSS stands for
Cascading Style Sheets