Operations of the Internet Test STUDY GUIDE
According to the Ponemon Institute says ___________ Americans saw their identities compromised in 2014.
110 million
Which of the following has the greatest potential for compromising a user's personal privacy? The Internet Protocol (IP) address of the user's computer The user's email address A group of cookies stored by the user's Web browser The user's public key used for encryption
A group of cookies stored by the user's Web browser
A self-replicating computer program that spreads by sending copies of itself to other computers without the need for other programs to attach to it is what type of program?
A worm
According to experts, which of the following are existing vulnerabilities of the Internet? All mentioned options are existing vulnerabilities of the Internet. A physical attack that involves cutting fiber-optic cables Attacking electrical systems that control the energy grid Eroding the trust and confidence that the general public has in their online privacy and secure online transactions
All mentioned options are existing vulnerabilities of the Internet.
Which of the following best describes a Distributed Denial of Services (DDoS) attack? An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems An attempt by a country to deny its citizens access to the Internet An attempt by a user of the Internet to get private information from a secure database An attempt by one user to deny services to another user by posting materials on a social network
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
Which of the following is LEAST likely to indicate a phishing attack? An email from your bank asks you to call the number on your card to verify a transaction An email from a merchant asks that you click on a link to reset your password An email from a utility company asks you to enter your date of birth and social security number for verification purposes An email indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you.
An email from your bank asks you to call the number on your card to verify a transaction
Former NSA Director Mike McConnell suspects ______ has hacked "every major corporation."
China
Hackers and malware already have breached their defenses, or soon will is known as
Compromise
Espionage and data theft are threats to
Confidentiality
Which of the following acts are recognized as unethical uses of computers? A) Netflix B) YouTube C)COD D) Fortnite E) None of the above
D.... or E
Malicious actors target ____ any device or sensor connected to a network—to break into that network.
Endpoints
An integrity solution to cybersecurity would act less like alarm and more like a locks.
False
Most companies focus overwhelmingly on encryption and perimeter defense in a post-perimeter world. Their security plans undervalue availability, and rarely address_______.
Integrity
The biggest threat to businesses and governments today is:
Integrity
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true? Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer A user will not be able to log in to email or social media accounts during the anonymous browsing session The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded
Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer
Downloading a song from a friend or relative without payment or licensing from the song's author is an example of what?
Piracy
Which of the following is considered an unethical use of computer resources? Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab Searching online for an electronic version of a school textbook. Downloading freeware or shareware onto your home computer Purchasing a game from an app store and downloading it directly to a mobile device
Purchasing a single-user copy of photo editing software and installing it on all computers in a computer lab
Which of the following activities poses the greatest personal cybersecurity risk? Question 3 options: Reserving a hotel room by emailing a credit card number to a hotel Making a purchase at an online store that uses public key encryption to transmit credit card information Paying a bill using a secure electronic payment system Withdrawing money from a bank account using an automated teller machine (ATM)
Reserving a hotel room by emailing a credit card number to a hotel
Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?
The ability to provide credibility to the information distributed
The "Bring Your Own Device" age has weakened network securities by providing more vulnerabilities.
True
We can no longer count on keeping the hackers out of our networks
True
A computer program that is written to specifically delete, destroy, or otherwise damage a computer if an example of a(n):
Virus