Quiz 5
Passcode is another term for a(n) ______.
PIN
Which of the following is not a green computing recommendation?
Purchase low-efficiency equipment.
A rootkit can be a backdoor.
True
Common digital security risks include information theft and system failure.
True
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
True
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
True
Which of the following is NOT a part of a typical single-user license agreement?
You can rent or lease the software.
An encryption ______ is a set of steps that converts readable text into unreadable text.
algorithm
A(n) ______ has a goal of destroying data or stealing information.
cracker
A(n) ______ demands payment to stop an attack.
cyberextortionist
A(n) ______ backup copies only the files that have changed since the last full backup.
differential
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
distributed
An iris recognition system uses technology to read patterns in the user's ______.
eye
A(n) ______ was originally a complimentary work for a computer enthusiast.
hacker
Malware is short for ______ software.
malicious
A password ______ is a service that stores all of your account information securely.
manager
PIN stands for personal identification ______.
number
A(n) ______ often uses prewritten hacking and cracking programs.
script kiddie
Another term for botnet is ______ army.
zombie
What is an audit trail?
A file that records access attempts
What does a keygen do?
Creates software registration numbers.
Software used to fight cybercriminals is called crimeware.
False
To protect files on your device's hard drive from hackers, turn on file and printer sharing.
False
Two users can have the same email address.
False
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
False