E. Technology 5

Ace your homework & exams now with Quizwiz!

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service

voice verification system

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

Backup

Type of hacker who intends serious harm through espionage, theft, or disruption of a network

Black Hat

Computer taken over by hackers to perform malicious tasks across a network What is the term for a program that performs a repetitive task on a network

Bot

In order to safeguard your personal information, which of the following is recommended

Clear your history file when you are finished browsing

Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons

Components of an online profile

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate

Digital

Items an identity thief can obtain to impersonate you

Driver's license, birth certificate

Computer Generation

First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer

Common forms include computer viruses, Trojan horses, and worms

Malware

First step to take when being cyberbullied or cyberstalked

Report abuse quickly

Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission Internet advertising firms often use which of the following to collect information about users web browsing habits

Spyware

Which of the following statements is not true about intellectual property rights

The term fair use refers to the rights which creators are entitled for their work

True or False

True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it's lost.

Type of hacker who wants to show off their skills and doesn't intend any serious damage

White Hat

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them

information privacy

One secure method of online payment

electronic wallet

Indication that a Web site is secure for shopping

https://

Type of malware that collects bits of data, like your surfing habits

spyware

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages

Displays unwanted advertisements in banners or pop-up windows on your computer

Adware

Used by commercial Web site vendors to identify users and customize Web pages

Cookie

False

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

Digital Security risk

Unless you want to allow others to follow your locations throughout the day, disable the

GPS

The nation's fastest growing crime, where victims are unaware it's being committed until the damage is done

Identity theft

What occurs when someone steals personal or confidential information

Information theft

Legal or Illegal

Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source

A set of online communication practices and rules

Netiquette

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Spoofing

True or False

True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender

a digital signature

The term back door, as it refers to computer crime, is

a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer

a rootkit

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network

a worm

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts

an audit trail

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program

clickjacking

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action

cracker

Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people

cyberterrorism

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks

digital forensics

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited

employee monitoring

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following

ethical

Which of the following does your college use to verify your identity

hand geometry system

Events that account for almost half of total catastrophic data losses

hurricanes and storms

Indication that a Web site is not secure

misspelled company name

Online payment method to avoid

money transfer

Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information

phishing

A slowed down Wi-Fi connection can be the result of this

piggybacking

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process

product activation

Type of power supply/battery backup device that can prevent some forms of data loss

uninterruptible

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

virus

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

worm


Related study sets

Series 7 Simulated Exam Questions

View Set

Chapter 6 - Life Insurance Premiums, Proceeds and Beneficiaries

View Set

NUR 211 Exam 3 Practice Questions

View Set