Discovering Computers Ch. 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? -decryption -digitization -re-securing -assessment

decryption

Which of the following statements is not a safeguard against the failure of hardware? -UPS -device-tracking apps -fault-tolerant computers -surge protectors

device-tracking apps

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? -assigned -secure -protected -digital

digital

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? -network compromise -technical terrorism -digital security risk -information liability

digital security risk

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? -acceptable -ethical -practical -permissible

ethical

Which of the following does your new smartphone use to unlock the device? -iris recognition system -hand geometry system -digital forensics system -face recognition system

face recognition system

Which of the following copies all of the files in a computer? -differential backup -selective backup -full backup -incremental backup

full backup

Social engineering, as it pertains to computers, is _____________. -filtering Internet content to targeted users based on their personal preferences -creating consumer and personal profiles by tracking website history and electronic purchases -compiling data from multiple computer users in order to make predictions about computer trends -gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children? -iris recognition system -hand geometry system -face recognition system -digital forensics system

hand geometry system

Which of the following can transmit germs? -digital forensics systems -iris recognition systems -face recognition systems -hand geometry systems

hand geometry systems

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. -software theft -information theft -decryption -digital forensics

information theft

Which of the following can be used to create a software registration number, sometimes illegally? -keygen -decryption key -BSA -public key

keygen

With a three-generation backup policy, the grandparent is which of the following? -most recent copy of the file -second oldest copy of the file -original file -oldest copy of the file

oldest copy of the file

Which of the following does your financial institution use to reduce fraud? -digital forensics system -signature verification system -iris recognition system -hand geometry system

signature verification system

Which of the following is the least likely motive for a DDoS? -negative recognition -extortion -political anger -spoofing

spoofing

Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? -veiling -phishing -spoofing -costuming

spoofing

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? -substitution -expansion -compaction -transposition

substitution

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? -IP -DoS -PGP -TCP

IP

Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? -spike -cookie -worm -payload

cookie

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? -cyberextortionist -cyberterrorist -hacker -script kiddie

cyberterrorist

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions? -expansion algorithm -compaction algorithm -Caesar cipher -transposition algorithm

Caesar cipher

In order to safeguard your personal information, which of the following is recommended? -Clear your history file when you are finished browsing -Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them -Use shopping club and buying cards when shopping to remain anonymous -Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase

Clear your history file when you are finished browsing.

Personal computers, display devices, and printers should comply with guidelines of which of the following programs? -ENERGY STAR -ACCEPTABLE USE -SECURE ELECTRONICS -GREEN COMPUTING

ENERGY STAR

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public? -Computer Abuse Amendments Act -COPPA -CAN-SPAM Act -Electronic Communication Privacy Act

Electronic Communication Privacy Act

Which of the following is not a possessed object? -key -PIN -smart card -badge

PIN

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? -They reset the files. -They resource the files. -The index the files. -They restore the files.

They restore the files.

The term CAPTCHA is _____________ -the average time it takes a computer to discover a password based on the number of characters -a series of distorted characters that a user is required to enter correctly to continue using a website -a private combination of words associated with a user name that allows access to computer resources -a digital image used to help decipher a faded or blurry word in digitized news archives

a series of distorted characters that a user is required to enter correctly to continue using a website

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? -a software license -fair use -an IT code of conduct -digital rights management

an IT code of conduct

Which of the following is an authorized person or company that issues and verifies digital certificates? -certificate office -certificate bureau -certificate authority -certificate agency

certificate authority

In your encryption algorithm, you removed every third letter. Which algorithm did you use? -expansion -compaction -transposition -substitution

compaction


संबंधित स्टडी सेट्स

Organization behavior, structure, process 4375 Chpt 14

View Set

Physics Conceptual Questions (Exam #2 Practice)

View Set

Exponents and Order of Operations

View Set

15.4.4 - Network Security (Practice Questions)

View Set

Parts of Female Reproductive System - Elementary

View Set

Chapter 9 and 11 Membrane potentials

View Set