Security Awareness - Course Review Chapters 1-6
Sending an email that falsely claims to be from a legitimate source to trick the user into surrendering private information is called web triggering email fraud remote hacking phishing
phishing
Using a common dictionary word or personal information in a password can create what is known as a(n) _____ weak password complex password personal password private password
weak password
A(n) _____ prevents a mobile device from being used until the user enters the correct passcode. personal ID reader (PIDR) lock screen magnetic carriage swipe card
lock screen
Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action is called virusware malware hackware attackware
malware
Each of the following can be used to introduce malware onto a user's computer through the web browser except Scripting code Plug-Ins Extensions Attachments
Attachments
Each of the following is a risk of using an unprotected Wi-Fi network except Malware can be injected into the user's computer by a remote attacker. An attacker may be able to access unprotected files on a computer without the user's knowledge. Strangers can read information sent over the network. Attackers can remotely manipulate the keyboard and mouse.
Attackers can remotely manipulate the keyboard and mouse.
What is the name of a short-range wireless technology used for interconnecting devices like a cell phone and speakers? Zigger Radio Frequency ID Bluetooth Far Field Connectivity
Bluetooth
What happens as security is increased? Attackers become more successful. Availability is increased. Vulnerabilities likewise increase. Convenience is decreased.
Convenience is decreased.
_____ ensures that the information is correct and no unauthorized person or malicious software has altered that data. Availability Integrity Authentication Confidentiality
Integrity
Which of the following about spam is false? It costs spammers very little to send spam email messages. Spam can be used to distribute malware. It is illegal to send spam. Billions of spam messages are sent each day.
It is illegal to send spam.
Each of the following is a recommended practice for protecting privacy except Keep a copy of your social security card in a secure location in your wallet Shred financial documents and paperwork that contains personal information Use encryption to protect sensitive documents that contain personal information Do not provide personal information either over the phone or through an email message
Keep a copy of your social security card in a secure location in your wallet
Attackers who use automated attack software and whose objective is to gain attention for themselves are called _____. Script kiddies Hacksters Spies Black-beret attackers
Script kiddies
_____ is the state of being free from danger. Control Privacy Security Protection
Security
What is a publicly released software security update intended to repair a vulnerability? Update roller Repair package Security patch Fixware
Security patch
Why are embedded hyperlinks dangerous? They can contain malware. They can be used to silently direct users to the attacker's website. They use more computer hardware resources than non-embedded hyperlinks. They can cause the keyboard to quickly become non-responsive.
They can be used to silently direct users to the attacker's website.
Which of the following is a reason why it is difficult to defend against attacks today? Computers run so fast they can be configured by attackers to by-pass antivirus software. There are no laws that can be used to prosecute attackers so they freely operate without any fear. Attackers jam the wireless signals going to technology devices to prevent anti-malware software from running. Users are required to make difficult security decisions with little or no instruction.
Users are required to make difficult security decisions with little or no instruction.
What technology should be used to protect a home Wi-Fi network? IRC WPA2 WEP CTS
WPA2
A(n) _____ is one that is performed continually without any intervention by the user. continuous backup media backup hardware backup scheduled backed
continuous backup
"Scrambling" data so that it cannot be read is a process known as steganography alliteration mushing cryptography
cryptography
Symmetric encryption is also called dual key cryptography secure key cryptography private key cryptography public key cryptography
private key cryptography
Attacks that manipulate users to perform an action or gather confidential information are called _____ technology fraud personal manipulation user hacking social engineering
social engineering
Which of the following is correct about a computer virus? Computer viruses cannot infect files. A computer virus can "jump" from once computer to another computer without any human intervention. A computer virus reproduces itself on the same computer without any human intervention. A "worm" is another name for a computer virus.
A computer virus reproduces itself on the same computer without any human intervention.
What is a cookie? A file that contains user-specific information that has been deposited by a server. A compressed version of an email attachment. A cookie is another name for a virus. A computer hardware device that stores user web preferences.
A file that contains user-specific information that has been deposited by a server.
Most password attacks today use what technique? Offline cracking Resource sharing Personal scraping Online bruting
Offline cracking
_____ is defined as the state or condition of being free from public attention to the degree that you determine. Privacy Security Anonymity Vulnerability
Privacy