Cosc 1301 Ch 5 & 6 exam

Ace your homework & exams now with Quizwiz!

Internet2 is _____.

A research and development tool that is focused on speed

In the accompanying figure, boxes _____ denote the transfer of an email from a sender's mail server to a receiver's mail server.

B-D

Iris is a globetrotter. She has recently visited Europe and taken many pictures, which she wishes to share with her friends and family through a media-sharing website. Which of the following social media should Iris use to upload the pictures?

Flickr

Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

Encryption

_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals.

Encryption

_____ occurs when an online buyer receives the proper items but falsely claims that they never arrived.

Onlilne auction fraud

A _____ requires the person requesting access to provide information that only an authorized user is supposed to know.

Possessed knowledge access system

The biggest advantage of Voice over Internet Protocol (VoIP) is _____.

cost savings

The term podcast is derived from the _____.

iPod

Which of the following is a recorded audio or video file that can be downloaded via the Internet?

A podcast

The roots of the Internet began with an experimental project called _____ created in 1969 by the U.S. Department of Defense Advanced Research Projects Agency (ARPA).

ARPANET

Harvey, a burglar, breaks into a senior security officer's house by tapping a valid NFC cardon to the door's sensor. However, when opens the officer's room, the security system asks for finger print verification. When he places his finger on the sensor, the alarm goes off and he gets caught. Here, the officer has used _____ to protect his room.

Biometric access system

A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.

Botnet

​Liz owns an accounting firm in Seattle. Due to a fire, the company experiences fluctuations in its electricity supply. Liz chalks out a plan that identifies who would take charge in case of a disaster. What type of plan has Liz prepared?

Business continuity plan

Instant messaging is commonly referred to as _____.

Chat

Initially, ARPANET connected four mainframe computers.​

False

Internet content providers are the suppliers of the information that is available through the Internet. Internet content providers can be commercial businesses, nonprofit organizations, educational institutions, individuals, and more. See 5-1: Evolution of the Internet

False

Mobile wireless Internet access requires a DSL modem and is available only to users who are relatively close to a telephone switching station and who have telephone lines capable of handling DSL.

False

One of the most important components of security software is recovery software, which protects against computer viruses and other types of malware.

False

Twitter lets you post updates called tweets of up to 200 characters that anyone can view.

False

Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.

False

_________ includes any illegal act involving a computer.

Cybercrime

_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

Cyberstalking

_________ involves terrorists launching attacks via the Internet.

Cyberterrorism

In the accompanying figure, box _____ denotes the area where the email sent by a user is stored until the recipient opens the email.

D

A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

Digital signature

According to the online version of the Merriam-Webster Dictionary, the term plagiarize means "to use another's production by crediting the source."

False

Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software.

False

Data on Web sites are safe from hackers.

False

Denial of service attacks today are often directed toward popular or controversial sites and typically are carried out via multiple computers. This is known as a concentrated denial of service attack.

False

Fixed wireless Internet access is a direct connection that transmits via standard telephone lines but does not tie up one's telephone line.

False

A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

Firewall

Sara, the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.

Full disk encryption

_____ are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet.

Governments

_____ refers to the act of breaking into a computer or network.

Hacking

John wants to know about free security software he can purchase for his new laptop. He types the keyword "free security software" in the search box and hits enter, which results in a list of links such as "https://www.avast.com/," "free.avg.com/," "http://www.avira.com/," etc. He clicks on one of the links to know more about the product. The links displayed on his screen are known as _____.

Hits

_____ occurs when someone obtains enough information about a person to be able to masquerade as that person.

Identity theft

_________ are enterprises that own or operate the paths or "roadways" along which Internet data travels.

Infrastructure companies

Mistletoe is a TV network that primarily broadcasts animated shows. It supplies the latest episodes of its new TV show, Violet the Enchantress, to Hulu. Here, Mistletoe is a(n) _____.

Internet content provider

_____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the development of revolutionary Internet technologies.

Internet2

Suzy loses her smartphone in a concert. She uses a software to remotely erase all the data on her device. She also sends an alarm signal to her device through the software. Identify the software that Suzy has used.

Kill switch

Tom is an HR manager at Yellowwood LLC, which provides financial services. The company wants him to hire a financial advisor who can provide guidance on taxes, stakes, and insurance decisions. Tom should use _____ to find the most suitable candidate for the role.

LinkedIn

Despite its popularity in academia and with government researchers, the Internet went virtually unnoticed by the public and the business community for over two decades because it required computers and it was hard to use.

True

Mobile wireless Internet access is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a mobile phone network, even as they are carried from place to place.

True

Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs.

True

The best protection against many dot cons is to protect any identifying information about oneself that could be used in fraudulent activities.

True

The purpose of a digital certificate is to authenticate the identity of an individual or organization.

True

The type of device used, the type of Internet connection and service wanted, and the geographical location determine the Internet service provider (ISP) options.

True

_________ is the concept that treats all content on the Internet equally.

Net neutrality

To avoid plagiarizing Web page content, one should credit Web page sources when they are used in papers, on Web pages, or in other documents.

True

​According to a report by security company Websense, more than half of the Web sites classified as malicious are actually legitimate Web sites that have been compromised.

True

​According to the FBI, organized crime organizations in many countries are increasingly turning to computer crime to target millions of potential victims.

True

_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature.

Two-factor authentication

_____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others.

Opting out

_____ is an example of an online payment service.

Paypal

Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.

Pharming

_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information.

Pharming

_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

Phishing

Lia, a project manager at a reputed firm, wants to schedule a meeting with the top management immediately to discuss a high-priority issue. Lia should use _____ to determine the availability status of the concerned people.

Presence technology

_________ uses a direct connection and has speeds similar to Digital Subscriber Line (DSL) access, but it is more expensive than both DSL and cable and almost always has a data cap.

Satellite Internet access

Elsa, a professional chef, browses the Internet for recipes of certain Chinese dishes. She browses for information on Google, which is a _____.

Search site

Pablo, a content writer, receives a text message, on his cellphone, containing details about a job offer. The type of message received by Pablo is called _____.

Short Message Service (SMS)

_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.

Skimmers

_____ refers to unsolicited email sent to a large group of individuals at one time.

Spam

Rosanna has assembled her new personal computer. While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

Surge supressor

_____ is the complete malfunction of a computer.

System failure

_____ is the largest and most well-known computer network, linking billions of computers all over the world.

The Internet

Which of the following provides leadership in addressing issues that may impact the future of the Internet?

The Internet society

Identify a disadvantage of Web-based training and distance learning.

There is a possibility of technological problems.

Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.

Trojan horse

Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.

Unauthorized access

_________ occurs whenever an individual gains admission to a computer, network, file, or other computing resource without permission.

Unauthorized access

An employee using an office computer to check personal emails is an example of _____.

Unauthorized use

Which of the following is a term used by individual providers for fiber-to-the-premises (FTTP)?

Verizon FOS

Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop. Therefore, she decides to install closed-circuit security cameras in her shop to prevent future robberies. Identify the technology Helen has used.

Video surveillance

A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

Virus

_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.

War driving

_____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.

Web site alteration

Bluewood Hospital uses a connection that allows its patients and visitors to connect their devices wirelessly to the Internet. Here, Bluewood Hospital has created a _____.

Wi-Fi hotspot

_________ is accessing someone else's unsecured Wi-Fi network from the hacker's current location without authorization.

Wi-Fi piggybacking

The _________ is an international community of over 450 organizations dedicated to developing new protocols and specifications to be used with the Web and to ensure its interoperability.

World Wide Web Consortium (W3C)

​A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.

two-factor authentication

Heidi wants to create a collaborative Web page that allows modification by multiple individuals. Here, Heidi is creating a ____.

wiki

Which of the following statements are true of Internet2?

​It is the first national network to use 100 Gigabit Ethernet over its entire footprint.

Rihanna owns a publication in New Jersey. She uses a Web-based software, Open Journals, to manage her publication works. She often downloads many Web-based applications needed for her work. Here, _____ are the companies that distribute Web-based software facilities to Rihanna over the Internet.

application service providers

Keisha decides to set up a cable Internet connection. She will require a _____ for this cable service.

cable modem

Two of the most common ways individuals are harassed online are cyberbullying and _____.

cyberstalking

Ashley enters "Baking" in the search bar of a search engine. The search engine returns links to baking recipes, history of baking sites, and sites with definitions of baking. Here, the term "Baking," entered by Ashley, used by the search engine to return results is called a _____.

keyword

According to the online version of the Merriam-Webster Dictionary, the term _____ means "to steal and pass off the ideas or words of another as one's own."

plagiarize

John has a laptop that has survived many drops over concrete and withstood extreme temperature variations. John's laptop can be categorized as a _____.

ruggedized device

Facebook is an example of a(n) _____.

social networking site

Jamie is an entrepreneur and owns three apparel stores in Queensland. The state has levied a tax on the stores to fund various public expenditures. She decides to go through only the government Web pages that provide information related to tax tips before paying the taxes. Which of the following search phrases will provide results of only government Web pages related to tax tips?

tax tips site: .gov


Related study sets

Exam 3: Intracranial Problems NCLEX Questions

View Set

NR 222-Health and Wellness-Exam 1 review

View Set

Chapter 13 - Cardiovascular Alterations (Evolve)

View Set

Eczema & Related Dermatoses CB EDIT

View Set

Chapter 10: Drug Therapy for Dyslipidemia

View Set