• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back

____ apps can allow you to lock your mobile device and SIM card remotely.


  • mobile security
  • mobile tech
  • SIM security
  • remote security

Answer:


mobile security

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


  • limited
  • distributed
  • delayed
  • staggered

Answer:


distributed

What is the term for a program that performs a repetitive task on a network?


  • rootkit
  • Trojan horse
  • bot
  • zombie

Answer:


bot

How much do fingerprint readers typically cost?


  • less than $10
  • less than $100
  • between $250 and $500
  • more than $1000

Answer:


less than $100

What is an EULA intended to do?


  • contract with an outside organization to provide security and recovery services for a network
  • outline computer activities for which the computer and network may or may not be used
  • license software for individual use
  • establish a network of computers, such as a homegroup

Answer:


license software for individual use

Which of the following provides the mobile user with a secure connection to the company network server?


  • TPN
  • XPN
  • SPN
  • VPN

Answer:


VPN

Which of the following best describes the term, cybercrime?


  • a type of gaming software that simulates criminal acts
  • any illegal act involving a computer
  • online or Internet-based illegal acts
  • using the Internet to apprehend and prosecute criminals

Answer:


online or Internet-based illegal acts

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?


  • distributed
  • multipurpose
  • network
  • site

Answer:


network

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?


  • cyberterrorist
  • script kiddie
  • cyberextortionist
  • cracker

Answer:


cracker

The term firewall is ...


  • the access point a hacker uses to intrude on a computer or network
  • a program that searches for cybercriminals by looking for patterns in attacks
  • a virus that prevents the computer or network from accessing outside resources
  • hardware and/or software that protects a network’s resources from intrusion

Answer:


hardware and/or software that protects a network's resources from intrusion

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?


  • backup
  • restored file
  • bot
  • IP file

Answer:


backup

Which of the following is an authorized person or company that issues and verifies digital certificates?


  • certificate office
  • certificate agency
  • certificate bureau
  • certificate authority

Answer:


certificate authority


Which of the following copies all of the files in a computer?


  • differential backup
  • incremental backup
  • full backup
  • selective backup

Answer:


full backup

​What occurs when someone steals personal or confidential information?


  • information theft
  • corruption
  • compaction
  • fraud

Answer:


information theft

Which of the following statements is not true about biometric devices?


  • Personal characteristics are unique and cannot be forgotten or misplaced.
  • Biometric devices translate a personal characteristic into a digital code.
  • Biometric devices are an unreliable method of identification and notification.
  • Examples include fingerprint readers and hand geometry systems.

Answer:


Biometric devices are an unreliable method of identification and notification.

What happens during a DDoS attack?


  • An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
  • Antivirus software disables a virus and protects the computer or network from unauthorized access.
  • A zombie army is used to attack computers or computer networks.
  • The police use a virus and other measures to take down a network of computer criminals.

Answer:


A zombie army is used to attack computers or computer networks.

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?


  • cyberterrorist
  • script kiddie
  • cyberextortionist
  • cracker

Answer:


cyberterrorist

Which of the following categories are the rights to which creators are entitled for their work?


  • community property
  • intellectual property
  • creative
  • ethical

Answer:


intellectual property

The term CAPTCHA is _____________.


  • a private combination of words associated with a user name that allows access to computer
  • the average time it takes a computer to discover a password based on the number of characters
  • a series of distorted characters that a user is required to enter correctly to continue using a website
  • a digital image used to help decipher a faded or blurry word in digitized news archives

Answer:


a series of distorted characters that a user is required to enter correctly to continue using a website.

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?


  • PGP
  • DoS
  • TCP
  • IP

Answer:


IP

Websites use which of the following to keep track of items in a user’s shopping cart?


  • adware
  • shopping bot
  • session cookie
  • zombie

Answer:


session cookie

Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


  • job spamming
  • employee indexing
  • employee monitoring
  • manager filtering

Answer:


employee monitoring

How long can digital certificates be valid?


  • five years
  • two years
  • four years
  • six months

Answer:


two years

With which of the following do users choose which folders and files to include in a backup?


  • full backup
  • incremental backup
  • differential backup
  • selective backup

Answer:


selective backup

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?


  • untrusted sources
  • threats
  • cybermalls
  • malware

Answer:


malware

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?


  • They reset the files.
  • The index the files.
  • They resource the files.
  • They restore the files.

Answer:


They restore the files.

Internet advertising firms often use which of the following to collect information about users web browsing habits?


  • postware
  • spyware
  • comware
  • billware

Answer:


spyware

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


  • transmitting
  • spoofing
  • victimizing
  • rebuking

Answer:


spoofing

Which encryption algorithm inserts characters between existing characters?


  • expansion
  • substitution
  • transposition
  • compaction

Answer:


expansion

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?


  • assessment
  • digitization
  • re-securing
  • decryption

Answer:


decryption

What is another name for public key encryption?


  • secure key encryption
  • controlled key encryption
  • virtual key encryption
  • asymmetric key encryption

Answer:


asymmetric key encryption

Into which of the following kinds of ports do external fingerprint readers plug?


  • USB
  • MIDI
  • parallel
  • serial

Answer:


USB

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


  • script kiddie
  • cyberterrorist
  • cyberextortionist
  • hacker

Answer:


script kiddie

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?


  • Electronic Communications Privacy Act (ECPA)
  • Fair Credit Reporting Act
  • Computer Fraud and Abuse Act
  • Computer Matching and Privacy Protection Act

Answer:


Electronic Communications Privacy Act (ECPA)

With a three-generation backup policy, the grandparent is which of the following?


  • second oldest copy of the file
  • original file
  • most recent copy of the file
  • oldest copy of the file

Answer:


oldest copy of the file

Which of the following terms refers to making a copy of a file?


  • backing up
  • restoring
  • encrypting
  • deciphering

Answer:


backing up

Which of the following is not a possessed object?


  • smart card
  • badge
  • PIN
  • key

Answer:


PIN

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?


  • backdoors
  • macros
  • keygens
  • indices

Answer:


macros

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?


  • secure
  • digital
  • protected
  • assigned

Answer:


digital

Which of the following is not a security product developer?


  • Adobe
  • McAfee
  • AVG
  • Symantec

Answer:


Adobe

What is the term for a website that uses encryption techniques to protect its data?


  • locked site
  • secure site
  • vault
  • virtual site

Answer:


secure site

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?


P...

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?


  • PIN
  • passterm
  • secure key
  • password

Answer:


password

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?


  • data rights
  • information privacy
  • acceptable use
  • social restrictions

Answer:


information privacy

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?


  • content license
  • copyright
  • access right
  • intellectual property deed

Answer:


copyright

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?


  • ACCEPTABLE USE
  • ENERGY STAR
  • SECURE ELECTRONICS
  • GREEN COMPUTING

Answer:


ENERGY STAR

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?



  • a rootkit
  • a Trojan horse
  • a virus
  • a worm

Answer:


a rootkit

Which of the following statements is not true about intellectual property rights?



  • A copyright protects any tangible form of expression.
  • The term fair use refers to the rights which creators are entitled for their work.
  • Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
  • Digital rights management is a strategy designed to prevent illegal distribution of digital content.

Answer:


The term fair use refers to the rights which creators are entitled for their work.

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?



  • data mining
  • cybersleuthing
  • system analysis
  • digital forensics

Answer:


digital forensics

Which of the following statements is not true about backing up?



  • Continuous data protection typically is used only by large enterprises.
  • A backup is a duplicate of a file, program, or disk.
  • Backup programs are available from many sources.
  • With a selective backup, all of the files in the computer automatically are chosen to be copied.

Answer:


With a selective backup, all of the files in the computer automatically are chosen to be copied.

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?



  • CAPTCHA
  • serial authentication
  • two-step verification
  • CERT/CC

Answer:


CAPTCHA

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called:



  • decryption
  • software theft
  • information theft
  • digital forensics

Answer:


information theft

The term, payload, as it pertains to computer crime, is defined as...



  • the destructive event or prank the program is intended to deliver
  • the amount of data loss to a company or individual who is a victim of a computer crime
  • the money a criminal receives from extortion or other computer crimes
  • the financial burden computer crime places on its victims

Answer:


the destructive event or prank the program is intended to deliver

The term back door, as it refers to computer crime, is...



  • a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
  • the vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
  • the area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future
  • a weakness in a computer or network’s security system that enables criminals to gain unauthorized access

Answer:


a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
25
35
55
75

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?



  • 25
  • 35
  • 55
  • 75

Answer:


25%

Which of the following does your college use to verify your identity?



  • hand geometry system
  • iris recognition system
  • digital forensics system
  • face recognition system

Answer:


digital forensics system

Which of the following statements is not true about Internet and network attacks?



  • No central administrator is present on the Internet.
  • It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
  • Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
  • Information kept on an organization’s premises has a higher security risk than information transmitted over networks.

Answer:


Information kept on an organization’s premises has a higher security risk than information transmitted over networks.

What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?


  • malware
  • cybersoft
  • evilapp
  • viralware

Answer:


malware

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?



  • voice verification system
  • digital forensics system
  • iris recognition system
  • hand geometry system

Answer:


voice verification system

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?



  • ethical
  • practical
  • acceptable
  • permissible

Answer:


ethical

Which of the following is the least likely motive for a DDoS?



  • spoofing
  • extortion
  • negative recognition
  • political anger

Answer:


spoofing

Which of the following is the process of restricting access to certain material on the web?



  • text remastering
  • content filtering
  • indexing
  • material masking

Answer:


content filtering

Social engineering, as it pertains to computers, is...



  • gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
  • filtering Internet content to targeted users based on their personal preferences
  • creating consumer and personal profiles by tracking website history and electronic purchases
  • compiling data from multiple computer users in order to make predictions about computer trends

Answer:


gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Many businesses use which of the following to limit employees’ web access?



  • spyware
  • honeypots
  • web bugs
  • content filtering

Answer:


content filtering