CGS 2060 Chapter 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

Backup

What is the term for a program that performs a repetitive task on a network?

Bot

A group of compromised computers connected to a network that attacks other networks.

Botnet

Which of the following is a federally funded Internet security research and development center?

CERT/CC

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

Caesar Cipher

Which of the following is an authorized person or company that issues and verifies digital certificates?

Certificate authority

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

Cyber terrorist

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

Cyberextoritonist

Which of the following can transmit germs?

Hand Geometry Systems

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

IP

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

Information Privacy

How much do fingerprint readers typically cost?

Less than $100

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

Network

Which of the following is not a possessed object?

PIN

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

Phishing

What is the term for a website that uses encryption techniques to protect its data?

Secure

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Spoofing

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

They restore the files.

Into which of the following kinds of ports do external fingerprint readers plug?

USB

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

Voice verification system

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

Worm

Which of the following is not a security product developer?

adobe

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

an audit trail

Which of the following terms refers to making a copy of a file?

backing up

In your encryption algorithm, you removed every third letter. Which algorithm did you use?

compaction

Many businesses use which of the following to limit employees' web access?

content filtering

Which of the following is the process of restricting access to certain material on the web?

content filtering

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

copyright

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

cracker

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

digital

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

digital sender

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

distributed

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

employee monitoring

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

energy star

Which encryption algorithm inserts characters between existing characters?

expansion

Hardware and/or software that protects a network's resources from intrusion...

firewall

Which of the following copies all of the files in a computer?

full backup

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called

informational theft

Which of the following categories are the rights to which creators are entitled for their work?

intellectual property

Which of the following are used to record, save, and then execute a set of keystrokes and instructions repeatedly?

macros

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

malware

Which of the following terms means in a location separate from the computer site?

off-site

Many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

password

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

Websites use which of the following to keep track of items in a user's shopping cart?

session cookie

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

site

Internet advertising firms often use which of the following to collect information about users web browsing habits?

spyware

A computer or device whose owner is unaware that an outsider is controlling the computer or device.

zombie

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

25%

Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable cipher text?

An Encryption Algorithm

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Digital Security Risk

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

Electronic Communications Privacy Act (ECPA)

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

Electronic Communications Privacy Act (ECPA)

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

Ethical

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

rootkit

How long can digital certificates be valid?

two years


संबंधित स्टडी सेट्स

Lab Textbook Reading Review Questions

View Set

African American History Final (Midterm)

View Set

NERVOUS SYSTEM - MULTIPLE CHOICE

View Set

Med-Surg Ch 26: The Sensory System: Ear

View Set

Leadership and Change Final (Hua)

View Set

History 206 American History Chapter 17

View Set