Security Awareness - Course Review Chapters 1-6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Sending an email that falsely claims to be from a legitimate source to trick the user into surrendering private information is called web triggering email fraud remote hacking phishing

phishing

Using a common dictionary word or personal information in a password can create what is known as a(n) _____ weak password complex password personal password private password

weak password

A(n) _____ prevents a mobile device from being used until the user enters the correct passcode. personal ID reader (PIDR) lock screen magnetic carriage swipe card

lock screen

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action is called virusware malware hackware attackware

malware

Each of the following can be used to introduce malware onto a user's computer through the web browser except Scripting code Plug-Ins Extensions Attachments

Attachments

Each of the following is a risk of using an unprotected Wi-Fi network except Malware can be injected into the user's computer by a remote attacker. An attacker may be able to access unprotected files on a computer without the user's knowledge. Strangers can read information sent over the network. Attackers can remotely manipulate the keyboard and mouse.

Attackers can remotely manipulate the keyboard and mouse.

What is the name of a short-range wireless technology used for interconnecting devices like a cell phone and speakers? Zigger Radio Frequency ID Bluetooth Far Field Connectivity

Bluetooth

What happens as security is increased? Attackers become more successful. Availability is increased. Vulnerabilities likewise increase. Convenience is decreased.

Convenience is decreased.

_____ ensures that the information is correct and no unauthorized person or malicious software has altered that data. Availability Integrity Authentication Confidentiality

Integrity

Which of the following about spam is false? It costs spammers very little to send spam email messages. Spam can be used to distribute malware. It is illegal to send spam. Billions of spam messages are sent each day.

It is illegal to send spam.

Each of the following is a recommended practice for protecting privacy except Keep a copy of your social security card in a secure location in your wallet Shred financial documents and paperwork that contains personal information Use encryption to protect sensitive documents that contain personal information Do not provide personal information either over the phone or through an email message

Keep a copy of your social security card in a secure location in your wallet

Attackers who use automated attack software and whose objective is to gain attention for themselves are called _____. Script kiddies Hacksters Spies Black-beret attackers

Script kiddies

_____ is the state of being free from danger. Control Privacy Security Protection

Security

What is a publicly released software security update intended to repair a vulnerability? Update roller Repair package Security patch Fixware

Security patch

Why are embedded hyperlinks dangerous? They can contain malware. They can be used to silently direct users to the attacker's website. They use more computer hardware resources than non-embedded hyperlinks. They can cause the keyboard to quickly become non-responsive.

They can be used to silently direct users to the attacker's website.

Which of the following is a reason why it is difficult to defend against attacks today? Computers run so fast they can be configured by attackers to by-pass antivirus software. There are no laws that can be used to prosecute attackers so they freely operate without any fear. Attackers jam the wireless signals going to technology devices to prevent anti-malware software from running. Users are required to make difficult security decisions with little or no instruction.

Users are required to make difficult security decisions with little or no instruction.

What technology should be used to protect a home Wi-Fi network? IRC WPA2 WEP CTS

WPA2

A(n) _____ is one that is performed continually without any intervention by the user. continuous backup media backup hardware backup scheduled backed

continuous backup

"Scrambling" data so that it cannot be read is a process known as steganography alliteration mushing cryptography

cryptography

Symmetric encryption is also called dual key cryptography secure key cryptography private key cryptography public key cryptography

private key cryptography

Attacks that manipulate users to perform an action or gather confidential information are called _____ technology fraud personal manipulation user hacking social engineering

social engineering

Which of the following is correct about a computer virus? Computer viruses cannot infect files. A computer virus can "jump" from once computer to another computer without any human intervention. A computer virus reproduces itself on the same computer without any human intervention. A "worm" is another name for a computer virus.

A computer virus reproduces itself on the same computer without any human intervention.

What is a cookie? A file that contains user-specific information that has been deposited by a server. A compressed version of an email attachment. A cookie is another name for a virus. A computer hardware device that stores user web preferences.

A file that contains user-specific information that has been deposited by a server.

Most password attacks today use what technique? Offline cracking Resource sharing Personal scraping Online bruting

Offline cracking

_____ is defined as the state or condition of being free from public attention to the degree that you determine. Privacy Security Anonymity Vulnerability

Privacy


संबंधित स्टडी सेट्स

UWF Florida History EXAM 3 STUDY GUIDE: WHAT?

View Set

CHARGING NISSAN LEAF: ENERGY PERKS BY EVGO® AND AMAZON HOME SERVICES

View Set

The causes of the French Revolution from 1774 and the events of 1789 + Some Napoleon

View Set

Albert Bandura: Social-Cognitive Theory and Vicarious Learning

View Set

Las características del siglo de oro

View Set

Brunner - Chapter 9: Chronic Illness and Disability - PrepU

View Set

Chapter 2: The Internet, The Web, and Electronic Commerce

View Set