BCIS-EXAM 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Digital rights management (DRM) is a system of access control that allows unlimited use of the material

False

Digital signals are continuous

False

Encrypting data is not an appropriate measure for mobile devices such as smartphones

False

Instant messaging is secure because of the type of encryption used

False

Plagiarism is illegal in the United States.

False

Which of the following is not a category of intellectual property?

Impression

which of the following is a digital video file format?

MPEG-4

Copyright a movie and giving it to a friend is not fair use

True

Copyright lasts for the life of the creator plus 70 years in the United States

True

Network adapters perform specific tasks to enable nodes to communicate on a network

True

Switches are used to send data on a specific route through an internal network.

True

Your Internet service provider has a default DNS server to translate a URL into an IP address.

True

Your social security number should never be shared on a website, in an email, or through messaging.

True

encryption virus

a program that renders your computer files unusable by compressing them

It is important to maintain your online reputation

all of the above

trademark

allows McDonalds to protect its logo

Digital Rights Management

allows only limited use of legally purchased materials

fair use

allows people to use portions of copyrighted work for specific purposes

black hat hacker

an unethical hacker

Which server would a client/server network include to allows users to share software?

application

DHCP

assigns users IP addresses for the duration of a session

worm

attempts to travel between systems through network connections to spread an infection

The process whereby users prove they have authorization to is a computer network is known as

authentication

Which is NOT a key component of a typical client/server network?

bastion host

Authentication techniques that rely on personal biological traits are called

biometrics

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses

Encryption is used to

code your e-mail so only one person can decipher it

web

delivers HTML documents on request

The combination of media, internet, entertainment, and phone services into a single device illustrates the principal of

digital Convergence

When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.

digitizing

commerce

enables users to purchase items over the internet

*Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.*

engineering

Which of the following is an area of an intranet that only certain corporations or individuals can access

extranet

*Reproduction by a teacher or student of small part of a work to illustrate a lesson is commonly known as educational____ use*

fair

Using copyrighted works without permission of the copyright holder is possible under the __ doctrine

fair use

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as

fake news

Which network cable type is virtually immune to signal interference?

fiber-optic

gray-hat hacker

flaunts expertise to the administrator of a system

Copyleft

granting of certain rights to a work while retaining other rights

*A(n)___ hat hacker illegally penetrates a system simply to demonstrate the hacker's experience to the system administrator*

grey

Which of the following is NOT one of the factors used in multi factor authentication?

identity

Hackers

illegally break into a computer or network

Antiviruses software prevents infection by recording key attributes about your files and checking to see if they change over time in process called

inoculation

The collection of large national and international networks used to establish the internet is called the

internet backone

A packet analyzer is called a sniffer because

it captures and reads data inside each packet.

increasing the sampling rate when digitizing a file has which effect on the file

it increases the file size

HTTPS is different than HTTP because

it is a combination of HTTP and the Secure Sockets Layer (SSL)

The DNS server

lets you look up an IP address from a domain name

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

network address translation (NAT)

sampling rate

number of times an analog wave is measured

*Illegally used copyrighted software is known as software ___*

piracy or copyright infringement

TCP

prepares dat for transmission providing for error checking and resending lost data

Computer virus

program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files

DHCP

protocol that assigns dynamic IP address

Ransomware as a Service has allowed the increase of

ransomware attacks

*Your online__ consist of the information available about you in cyberspace that can influence people's opinions of you in the real world*

reputation

A __ is a program that takes complete control of your computer without your knowledge

rootkit

a surge protector may look like another power strip but it also can

save your device if a voltage spike is sent through electrical system

On a client/server networks more users can be added without affecting the performance of other nodes. This is known as network

scalability

SMTP is the set of rules used to

send e-mail along the Internet to its destination

IP

sends data between computers on the internet

Which of the following is an advantage installing a client/server network in a business?

sharing of peripherals

multifactor authentication requires you to have a combination of

something you know something you are and something you own

email

specifically deal with the SMTP communication method

Which topology is most widely used today?

star

Social Engineering

techniques used to manipulate people into performing actions and divulging confidential information

which of the following does NOT determine the quality of a digital image e

the number of pixels in the camera lens

A private key is important

to decode an encrypted message

HTTP

transfer data from servers to browsers

DNS

translates domain names into IP addresses

MIME is the protocol that supports sending files as e-mail attachments

true

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network

true

sending emails to lure people to reveal personal information is a technique known as phishing

true

SMTP

used for transmission of email messages across the internet

cyberloafing

using an employer's computer for non-work activities

polymorphic virus

virus that changes its own code to avoid detection

logic bomb

virus that is triggered when certain conditions are met

The internet is primarily funded by

your federal income taxes

white hat hacker

An ethical hacker

CSS stands for

Cascading Style Sheets


संबंधित स्टडी सेट्स

Alternating Current Module 25: AC Circuits Dynamic Study Module

View Set

Chapter 18 Federal Judiciary Practice Test

View Set

Fundamental Chapter 9: Teaching and Counseling

View Set

Geology 103 Lessons 4 & 5--Midterm

View Set

INF 43: Introduction to Software Engineering

View Set

STUDY GUIDE EXAM 1 (SLIGHTLY LESS incomp)

View Set

Chapter 3: Nursing Practice and the Law, NCLEX - Legal & Ethical, Nursing Jurisprudence: Legal and Ethical Considerations NCLEX Practice Quiz, Legal and Ethical Issues in Nursing, NCLEX Questions-Ethical and Legal Issues, NCLEX STYLE REVIEW QUESTIONS...

View Set