Chapter 5 Review

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations
Group of compromised computers or mobile devices connected to a network
One whose owner is unaware the computer or device is being controlled remotely by an outsider
What happens during a DDoS attack
Bypasses security
The term firewall ____________
Protects the network
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
The term, PIN, is an acronym for which of the following
personal identification number
What term is used to describe the discovery collection and analysis of evidence found on computers and networks
Digital Forensics
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use
In your encryption algorithm, you removed every third letter. Which algorithm did you use
Which of the following statements is not true about software theft
Username and passwords to those who are registered can legally purchase copies of software
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender
digital signature
Which of the following terms is used to describe a set of steps that can convert readable plain text into unreadable ciphertext
Encryption algorithm
In order to safeguard your personal information, which of the following is recommended
clear history when finished browsing
Which of the following terms is used to describe a small text file that a web server stores on you computer
gaining unauthorized access to confidential information through trust
social engineering
What term is used to describe the process of restricting access to certain material on the web
content filtering
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
digital security risk
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge
script kiddie
Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
Which of the following is someone who uses the internet or network to destroy or damage computers for political reasons
cyber terrorist
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following
What is the term for a program that performs a repetitive task on a network
A ________ is a type of assault to disrupt computer access to internet services
DOS Attack
Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Which of the following are used to record, save, and then execute a set of keystrokes and instructions repeatedly
Which of the following is not a security product developer
Many websites require a user to enter a private combination of characters associated with a username that allows access to certain computer resources. What is the term for this combination of characters
Which of the following is not a possessed object
The illegal copying of software music and video is known as
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process
Which encryption algorithm replaces characters with other characters
What is another name for public key encryption
key encryption
Which of the following provides the mobile user with a secure connection to the company network server
How long can digital certificates be valid
two years
Which of the following kinds of certificate is a notice that guarantees a user or website is legit
Which of the following terms refers the making a copy of a file
backing up
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost or damaged
With which of the following do users choose which folders and files to include in a backup
selective backup
Which of the following categories are the rights to which creators are entitled for their work
intellectual property
Which of the following gives authors and artists the exclusive rights to duplicate publish and sell their materials
copy right
Any illegal act involving a computer generally is referred to as a computer crime
A cyber-extortionist uses the internet or network to destroy or damage computers for political reasons
A rootkit can be a back door
Personal Firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion
Both Windows and Mac operating systems include firewall capabilities
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, or mobile device, or network
Most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
If a program or device has a default password, be sure to retain it.
PINs are not the same as passwords
Biometric objects are completely foolproof
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer
Secure sites typically use digital certificates along with security protocols.
Digital signatures often are used to ensure that an impostor is not participating in an Internet transaction
Any device that connects to the internet is susceptible to mobile malware
Websites often collect data about you so that they can customize advertisements and send you personalized email messages
Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart
Your browsing history is a list of all websites you have visited over a period of time
To remove spyware, users need to obtain a special program that can detect and delete it
To protect yourself from social engineering scams, shred all sensitive or confidential documents
Many businesses use spyware to limit employees’ web access
HIPAA protects individuals against the wrongful disclosure of their health information
The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits
It is illegal for employers to use software programs that monitor employees
If a company does not have a formal email policy, it can read email messages without employee notification
Many internet security programs include a firewall, antivirus program, and filtering capabilities combined.

Your Deadline is Too Short?  Let Professional Writer Help You

Get Help From Writers