Security Awareness

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Credit score reports cost about ____.

$10 (Chapter 2 pg. )(Quiz)

FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every ____.

12 months (Chapter 2 pg. )(Quiz)

Because of a security weakness it is important that key values exceed ____ at least characters in length.

20 (Chapter 5)(Quiz)

The SMTP server listens on port number ____.

25

The average phishing site only exists for ____ days to prevent law enforcement agencies from tracking the attackers.

3.8 (Chapter 2 pg. )(Quiz)

If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report.

30 (Chapter 2 pg. )(Quiz)

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.

562 million (Chapter 1 pg. )(Quiz)

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

802.11g (Chapter 5)(Quiz)

A ___ has all the tools that a feature phone has, but also includes an operating system that allows it to run third-party applications (apps).

? (Chapter 5)(Quiz)

____ is a technology that can associate a user's identity to a public key, in which the user's public key has been "digitally signed" by a trusted third party.

A digital certificate

What is the difference between a hactivist and a cyberterrorist?

A hactivist is motivated by ideology while a cyberterrorist is not. (Chapter 1 pg. )(Questions)

How can an attacker use a hoax?

A hoax could convince a user that malware is circulating and that he should change his security settings. (Chapter 2 pg. )(Questions)

Which of the following is NOT a characteristic of a weak password?

A password that uses both letters and numbers (Chapter 2 pg. )(Questions)

The technical name for a Wi-Fi network is:

A. Wireless local area network (WLAN) (Chapter 5)(Questions)

Which type of firewall is an external hardware device?

A. network firewall (Chapter 3) (Questions)

____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications.

ActiveX controls

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key (Chapter 6)(Questions)

What is a vishing attack?

An attack that uses a phone instead of email or a website (Chapter 2 pg. )(Questions)

Which of the following is not a risk that someone would face using an unprotected home Wi-Fi network?

An attacker could steal sensitive date from a computer on the wireless network. (Chapter 5)(Questions)

What is one reason Android devices are considered to be at a higher security risk than iOS devices?

Android apps can be sideloaded. (Chapter 5)(Questions)

____ cryptography uses two keys.

Asymmetric (Chapter 5)(Quiz)

_____ ensures that individuals are who they claim to be.

Authentication (Chapter 1 pg. )(Questions)

_____ protects a mobile device when it has not been used for a set period of time.

Auto-lock (Chapter 5)(Questions)

____ ensures that data is accessible when needed to authorized users.

Availability (Chapter 1 pg. )(Quiz)

_____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

Bluejacking (Chapter 5)(Questions)

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

Bluejacking (Chapter 5)(Quiz)

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

Bluesnarfing (Chapter 5)(Quiz)

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

Bluetooth (Chapter 5)(Quiz)

Which of these password attacks is the most thorough?

Brute force attack (Chapter 2 pg. )(Questions)

Which of the following is not an issue raised regarding how private data is gathered and used?

By law all encrypted data must contain a "backdoor" entry point. (Chapter 6)(Questions)

Using video cameras to transmit a signal to a specific and limited set of receivers is called ___

CCTV (Chapter 6)(Quiz)

"____" involves breaking into a car's electronic system.

Car hacking (Chapter 1 pg. )(Quiz)

Each of the following is a step to deter identity theft except:

Carry a copy of a Social Security card in a wallet instead of the original. (Chapter 2 pg. )(Questions)

Which of the following is NOT a privacy best practice?

Carry your Social Security number with you so that it cannot be stolen you are not home. (Chapter 6)(Questions)

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare. (Chapter 6)(Questions)

_____ ensures that only authorized parties can view the information.

Confidentiality (Chapter 1 pg. )(Questions)

Which of the following is not a risk associated with the use of private data?

Devices being infected with malware. (Chapter 6)(Questions)

Which of these is not a method for encryption through software?

Encrypt using a separate hardware computer chip (Chapter 6)(Questions)

What is ciphertext?

Encrypted data. (Chapter 6)(Questions)

The ____ of 2003 contains rules regarding consumer privacy.

Fair and Accurate Credit Transactions Act (Chapter 2 pg. )(Quiz)

Web sites use the standard HTTP protocol for sending data through the Internet because this protocol is secure and ensures that an attacker cannot view the contents of the transmission.

False

FACTA grants consumers free access to their credit score.

False (Chapter 2 pg. )(Quiz)

Most viruses can spread to other computers by themselves.

False (Chapter 3) (Quiz)

Protecting your personal computer has become a serious challenge unless you are an advanced computer user.

False (Chapter 3) (Quiz)

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.

False (Chapter 5)(Quiz)

___ cookies can be used to reinstate regular cookies that a user has deleted or blocked.

Flash

In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.

Flashback (Chapter 1 pg. )(Quiz)

____ is the application of science to questions that are of interest to the legal profession.

Forensics (Chapter 6)(Quiz)

____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

GLBA (Chapter 1 pg. )(Quiz)

_____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information and to protect all electronic and paper containing personally identifiable financial information.

Gramm-Leach-Bliley Act (GLBA) (Chapter 1 pg. )(Questions)

____ policy is a Microsoft Windows feature that provides centralized management and configuration of computers and remote users using the Microsoft directory service Active Directory (AD).

Group (Chapter 6)(Quiz)

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

HIPAA (Chapter 1 pg. )(Quiz)

____ allows Web authors to combine text, graphic images, audio, video, and hyperlinks into a single document.

HTML

The _____ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.

Health Insurance Portability and Accountability Act (HIPAA) (Chapter 1 pg. )(Questions)

___ allow users to jump from one area on the Web to another with a click of the mouse button.

Hyperlinks

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

IEEE (Chapter 5)(Quiz)

The current version of IMAP is ____.

IMAP4

____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.

Identity theft (Chapter 1 pg. )(Quiz)

____ uses graphical images of text in order to circumvent text-based filters.

Image spam

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.

Integrity (Chapter 1 pg. )(Quiz)

The ____ is a worldwide set of interconnected computers, servers, and networks.

Internet

A ____ is a business from which users purchase Internet access.

Internet Service Provider

Which of the following is false about a wireless router?

It is usually found in a large business with hundreds of wireless users. (Chapter 5)(Questions)

Each of the following is a characteristic of a strong password except:

It must be easy to memorize. (Chapter 2 pg. )(Questions)

_____ is the process of bypassing the built-in limitations and protections of a mobile device.

Jailbreaking (Chapter 5)(Questions)

____ is a complete programming language that can be used to create stand-alone applications.

Java

____ is a scripting language that does not create standalone applications.

JavaScript

Each of these is a responsibility of an organization regarding user private data EXCEPT:

Keep personal information for no longer than 365 days. (Chapter 6)(Questions)

Why are long passwords stronger than short passwords?

Long passwords require attackers to make many more attempts to uncover the password. (Chapter 2 pg. )(Questions)

A ____ address is a unique hardware number that is "burned in" to each wireless network interface card adapter.

MAC (Chapter 5)(Quiz)

A ____ is a series of instructions that can be grouped together as a single command.

Macro (Chapter 3) (Quiz)

Which level of UAC provides the lowest level of security?

Never notify (Chapter 3) (Questions)

Which technique do attackers use today to uncover a password?

Offline cracking (Chapter 2 pg. )(Questions)

____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.

Phishing (Chapter 2 pg. )(Quiz)

____ means an attacker who pretends to be from a legitimate research firm asks for personal information.

Pretexting (Chapter 2 pg. )(Quiz)

____ cryptography uses same single key to encrypt and decrypt a document.

Private key (Chapter 5)(Quiz)

Originally the term ____ referred to a set of modified and recompiled tools for the UNIX operating system.

Rootkit (Chapter 3) (Quiz)

The ____ in a Wi-Fi network serves as the network name identifier.

SSID (Chapter 5)(Quiz)

____ is software that displays a fictitious warning to the user in the attempt to "scare" the user into an action, such as purchasing additional software online to fix a problem that in fact does not exist.

Scareware (Chapter 3) (Quiz)

____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

Script kiddies (Chapter 1 pg. )(Quiz)

Each of the following may be performed by an identity thief except:

Send malware into a bank's online accounting system. (Chapter 2 pg. )(Questions)

Which of these could NOT be defined as a logic bomb?

Send spam email to all users in the company (Chapter 3) (Questions)

The practice called "____" requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

Separation of Duties (Chapter 6)(Quiz)

Which statement regarding a keylogger is NOT true?

Software keyloggers are easy to detect. (Chapter 3) (Questions)

What is the most important advantage of hardware encryption over software encryption?

Software that performs encryption can be subject to attacks. (Chapter 6)(Questions)

____ look for specific words and block e-mail messages containing those words.

Spam filters

_____ hides the existence of the data.

Steganography (Chapter 6)(Questions)

____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).

Swiss cheese (Chapter 3) (Quiz)

Why should you not sideload apps from an unofficial app store?

The apps on these sites are generally not previewed and may contain malware. (Chapter 5)(Questions)

Each of the following is typically found in an email used for a phishing attack except:

The telephone number of the actual site. (Chapter 2 pg. )(Questions)

Why can brokers command such a high price for what they sell?

The vulnerability they uncover was previously unknown and is unlikely to be patched quickly. (Chapter 1 pg. )(Questions)

Each of the following is true about privacy EXCEPT:

Today individuals can achieve any level of privacy that is desired. (Chapter 6)(Questions)

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____.

Trojan (Chapter 3) (Questions)

A computer ____ is a program advertised as performing one activity but actually does something else.

Trojan (Chapter 3) (Quiz)

Web servers distribute HTML documents based on a set of standards, or protocols, known as the Hypertext Transport Protocol (HTTP).

True

Today, many attack tools are freely available and do not require any technical knowledge to use.

True (Chapter 1 pg. )(Quiz)

The weakness of passwords centers on human memory.

True (Chapter 2 pg. )(Quiz)

When creating passwords, the most important principle is that length is more important than complexity.

True (Chapter 2 pg. )(Quiz)

Most Bluetooth devices have a range of only 33 feet (10 meters).

True (Chapter 5)(Quiz)

Restricting physical access in an office environment generally involves restricting access to facilities as well as to computer systems.

True (Chapter 6)(Quiz)

How many keys are used in asymmetric cryptography?

Two (Chapter 6)(Questions)

Which of the following is not a best practice for using a mobile device?

Wait 24 hours before reporting a lost device. (Chapter 5)(Questions)

Each of the following could be performed in a shoulder surfing attack except:

Watching the victim insert her plastic card into an ATM (Chapter 2 pg. )(Questions)

Passwords are based on which means of authentication?

What you know (Chapter 2 pg. )(Questions)

Each of the following is a question that the user should ask regarding data backups except _____.

Who should do the backup? (Chapter 3) (Questions)

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security.

Wi-Fi Protected Setup (WPS) (Chapter 5)(Quiz)

The ____ is composed of Internet server computers on networks that provide online information in a specific format.

World Wide Web

In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a ___ is used.

access point (Chapter 5)(Quiz)

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop.

ad hoc (Chapter 5)(Quiz)

Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.

advertising (Chapter 3) (Quiz)

Malware payload allows an attacker to execute virtually any command on the victim's computer this is called _____.

arbitrary code execution (Chapter 3) (Questions)

The process of providing proof that the user is "genuine" or authentic is known as_________.

authentication (Chapter 2 pg. )(Questions)

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time.

auto-lock (Chapter 5)(Quiz)

What is access a computer, program, or service that circumvents any normal security protections called?

backdoor (Chapter 3) (Questions)

A ____ is software code that gives access to a program or service that circumvents normal security protections.

backdoor (Chapter 3) (Quiz)

Each of the following is a typical feature of a fee-based Internet backup service except____________.

backup to an external hard drive (Chapter 3) (Questions)

Which of the following is not a type of malware that has as its primary trait circulation and/or infection?

botnet (Chapter 3) (Questions)

A ____ is created when hundreds, thousands, or even tens of thousands of zombie computers are manipulated under remote control.

botnet (Chapter 3) (Quiz)

Instructions written in HTML code specify how a local computer's Web ____ should display the words, pictures, and other elements on a user's screen.

browser

Each of the following is a reason why it is difficult to defend against today's attackers except

complexity of attack tools (Chapter 1 pg. )(Questions)

The ____ team is contacted whenever digital evidence needs to be preserved and serve as first responders.

computer forensics response (Chapter 6)(Quiz)

What is the first step in securing a Wi-Fi wireless broadband router?

creating a password to protect its internal configuration settings (Chapter 5)(Questions)

A ____ is a numerical measurement used by lenders to assess a consumer's creditworthiness.

credit score (Chapter 2 pg. )(Quiz)

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information are sometimes known as

cybercrime (Chapter 1 pg. )(Quiz)

Each of the following can be classified as an "insider" except _______.

cybercriminals (Chapter 1 pg. )(Questions)

The FBI defines ____ as any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."

cyberterrorism (Chapter 1 pg. )(Quiz)

The motivation of _____ is attacking for the sake of their principles or beliefs.

cyberterrorists (Chapter 1 pg. )(Questions)

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.

cyberterrorists (Chapter 1 pg. )(Quiz)

One of the best defenses against attacks is to create ____ on a regular basis.

data backups (Chapter 3) (Quiz)

A ___ lock extends a solid metal bar into the door frame for extra security.

deadbolt (Chapter 6)(Quiz)

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. This is known as ____.

denying services (Chapter 3) (Quiz)

A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.

dictionary (Chapter 2 pg. )(Quiz)

A(n) _____ is not decrypted but is only used for comparison purposes.

digest (Chapter 6)(Questions)

___ involves digging through trash receptacles to find information that can be useful in an attack.

dumpster diving (Chapter 2 pg. )(Quiz)

Tablet computers are designed for _____.

ease of use (Chapter 5)(Questions)

The primary design of a(n) _____ is to capture the transmissions from legitimate users.

evil twin (Chapter 5)(Questions)

Each of the following is a characteristic of cybercrime except______.

exclusive use of worms and viruses (Chapter 1 pg. )(Questions)

Which of the following devices does not have an operating system that allows it to run third-party applications?

feature phone (Chapter 5)(Questions)

Which of the following enhancements to software provides new or expanded functionality but does not address security vulnerabilities?

feature update (Chapter 3) (Questions)

Securing a restricted area by erecting a barrier, called ___, can be an effective method for maintaining security.

fencing (Chapter 6)(Quiz)

Residential hardware locks for doors generally fall in ____ categories.

four (Chapter 6)(Quiz)

A ____ is a collection of suggestions that should be implemented.

guideline (Chapter 6)(Quiz)

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.

hacker (Chapter 1 pg. )(Quiz)

Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data?

hash (Chapter 6)(Questions)

Each of the following is a password manager except:

hashing repository (Chapter 2 pg. )(Questions)

___ is a false warning, often contained in an e-mail message claiming to come from the IT department.

hoax (Chapter 2 pg. )(Quiz)

A ____ is essentially a duplicate of the organization's main production site and has all the equipment needed for it to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link. Select one:

hot site (Chapter 6)(Quiz)

Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.

impersonation (Chapter 2 pg. )(Quiz)

The areas of a file in which steganography can hide data include all of the following EXCEPT _____.

in the directory structure of the file system (Chapter 6)(Questions)

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

information security (Chapter 1 pg. )(Quiz)

Security is ____ convenience.

inversely proportional (Chapter 1 pg. )(Quiz)

Each of the following is the reason why adware is scorned, except _______.

it displays the attackers programming skills (Chapter 3) (Questions)

A ____ silently captures and stores each keystroke that a user types on the computer's keyboard.

keylogger (Chapter 3) (Quiz)

What prevents a mobile device from being used until the user enters the correct passcode?

lock screen (Chapter 5)(Questions)

Each of the following is a characteristic of cybercriminals except _______.

low motivation (Chapter 1 pg. )(Questions)

Keeping backup copies of important data stored in a safe place is an example of

minimizing losses (Chapter 1 pg. )(Questions)

Proving that a user sent an email message is known as _____.

nonrepudiation (Chapter 6)(Questions)

_____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.

obscurity (Chapter 1 pg. )(Questions)

Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate?

padlock (Chapter 6)(Questions)

The best approach to establishing strong security with passwords is to use a ____.

password management tool (Chapter 2 pg. )(Quiz)

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

people (Chapter 1 pg. )(Quiz)

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

pharming (Chapter 2 pg. )(Quiz)

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext (Chapter 6)(Questions)

A ____ is a document that outlines specific requirements or rules that must be met.

policy (Chapter 6)(Quiz)

Most Internet transmissions are based on ____.

port numbers

Michelle pretends to be a manager from another city and calls Eric to trick him into giving her his password. What social-engineering attack has Michelle performed?

pretexting (Chapter 2 pg. )(Questions)

Each of the following is a successive layer in which information security is achieved except _______.

purposes (Chapter 1 pg. )(Questions)

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?

ransomware (Chapter 3) (Questions)

Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it.

reading pane

Which of the following is not a step to reduce the risk of theft or loss of a mobile device?

recording the MAC address of the device before using it (Chapter 5)(Questions)

Protecting information is accomplished by

reducing risk factors (Chapter 1 pg. )(Questions)

On tablets and smartphones, it is recommended to download and install a ____ app that can erase the contents of the device if lost or stolen.

remote wipe (Chapter 5)(Quiz)

A _____ is a downloadable image that can be used to scan a computer for malware.

rescue disc (Chapter 3) (Questions)

Alice has attempted to enter the passcode for her mobile device but keeps entering the wrong code. Now she is asked to enter a special phrase to continue. This means that her mobile device is configured to _____.

reset to factory settings (Chapter 5)(Questions)

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss (Chapter 6)(Questions)

When a user moves from one cell of coverage to another cell in a Wi-Fi network this is called

roaming (Chapter 5)(Questions)

A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

rootkit (Chapter 3) (Quiz)

Unsigned Java applets run in a security ____, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer.

sandbox

A ____ is a written document that states how an organization plans to protect the company's information technology assets.

security policy (Chapter 6)(Quiz)

Observing someone entering a keypad code from a distance is known as _______.

shoulder surfing (Chapter 2 pg. )(Questions)

AV software on a computer must have its ____ files regularly updated by downloads from the Internet.

signature (Chapter 3) (Quiz)

The database that contains the sequence of characters of a virus is called the _____.

signature file (Chapter 3) (Questions)

A ____ contains an integrated circuit chip, which can hold information, which can then be used as part of the authentication process.

smart card (Chapter 6)(Quiz)

Relying on deceiving someone to obtain secure information is known as_____.

social engineering (Chapter 2 pg. )(Questions)

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.

social networking sites (Chapter 2 pg. )(Quiz)

A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Some botnets can also harvest e-mail addresses. This is known as ____.

spamming (Chapter 3) (Quiz)

Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.

spear phishing (Chapter 2 pg. )(Quiz)

A computer ____ is a person who has been hired to break into a computer and steal information.

spy (Chapter 1 pg. )(Quiz)

Which of these is a general term used for describing software that gathers information without the user's consent?

spyware (Chapter 3) (Questions)

A ____ is a collection of requirements specific to the system or procedure that must be met by everyone.

standard (Chapter 6)(Quiz)

Stolen wallets and purses contain personal information that can be used in identity theft. This is known as ____.

stealing (Chapter 2 pg. )(Quiz)

Private key cryptography is also called ____ cryptography.

symmetric (Chapter 5)(Quiz)

In a general sense "security" is _______.

the steps necessary to protect a person or property from harm (Chapter 1 pg. )(Questions)

A ___ party cookie is a cookie that was not created by the Web site that attempts to access the cookie.

third

A ____ is a type of action that has the potential to cause harm.

threat (Chapter 1 pg. )(Quiz)

What is a person or element that has the power to carry out a threat?

threat agent (Chapter 1 pg. )(Questions)

A ____ is a person or element that has the power to carry out a threat.

threat agent (Chapter 1 pg. )(Quiz)

What is an objective of state-sponsored attackers?

to spy on citizens (Chapter 1 pg. )(Questions)

The goal of a phishing attack is_____.

to trick a user into surrendering personal information (Chapter 2 pg. )(Questions)

A ___ is typically a small device (usually one that can be affixed to a keychain) with a window display.

token (Chapter 6)(Quiz)

Which of these is NOT an action that a virus can take?

transport itself through the network to another device (Chapter 3) (Questions)

Which of the following can add a stronger degree of security to a Wi-Fi network?

turn on guest access (Chapter 5)(Questions)

What provides the optimum level of wireless security for a home Wi-Fi network?

turning on Wi-Fi Protected Access 2 (WPA2) Personal (Chapter 5)(Questions)

How many carriers must a virus have to replicate and attack?

two (Chapter 3) (Questions)

A user who enters americanbank.net into a web browser instead of the correct americanbank.com and is then taken to a fake look-alike site is the victim of _____.

typo squatting (Chapter 2 pg. )(Questions)

A ____ is a program that does not come from a trusted source.

unsigned Java applet

A(n) _____ is a unique name for identification.

username (Chapter 2 pg. )(Questions)

Each of the following is a sound security practice when using a public Wi-Fi network except_____.

using the network for less than one hour per day (Chapter 5)(Questions)

A digital signature can provide each of the following benefits EXCEPT ______.

verify the receiver (Chapter 6)(Questions)

A ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.

virtual private network (Chapter 5)(Quiz)

A(n) _____ requires a user to transport it from one computer to another.

virus (Chapter 3) (Questions)

The two types of malware that have the primary objective of infecting a computer system are ____.

viruses and worms (Chapter 3) (Quiz)

An example of a(n) _____ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password.

vulnerability (Chapter 1 pg. )(Questions)

In information security terminology a(n) _____ is a flaw or weakness that allows an attacker to bypass security protections.

vulnerability (Chapter 1 pg. )(Questions)

A ____ is a flaw or weakness that allows a threat agent to bypass security.

vulnerability (Chapter 1 pg. )(Quiz)

War driving is derived from the term ____.

war dialing (Chapter 5)(Quiz)

___ is a wireless data network technology that is designed to provide high-speed data connections for mobile devices.

wireless fidelity (Chapter 5)(Quiz)

A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.

worm (Chapter 3) (Quiz)

An infected ''robot'' computer is known as a ____.

zombie (Chapter 3) (Quiz)

Botnets are composed of _____.

zombies (Chapter 3) (Questions)


Set pelajaran terkait

Rel 2240: Harry Potter, Magic, and Religion

View Set

CITI TRAINING: Social/Behavioral Human Research Course

View Set

PLS 21 Study Guide READING TESTS: CH8,9 TG3,4

View Set

Health Communication Campaigns Midterm

View Set

Chapter 13- Growth Strategies for entrepreneurial ventures

View Set