Chapter 5 Review

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
Rootkit
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations
Malware
Group of compromised computers or mobile devices connected to a network
Botnet
One whose owner is unaware the computer or device is being controlled remotely by an outsider
Zombie
What happens during a DDoS attack
Bypasses security
The term firewall ____________
Protects the network
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
spoofing
The term, PIN, is an acronym for which of the following
personal identification number
What term is used to describe the discovery collection and analysis of evidence found on computers and networks
Digital Forensics
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use
Transposition
In your encryption algorithm, you removed every third letter. Which algorithm did you use
compaction
Which of the following statements is not true about software theft
Username and passwords to those who are registered can legally purchase copies of software
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender
digital signature
Which of the following terms is used to describe a set of steps that can convert readable plain text into unreadable ciphertext
Encryption algorithm
In order to safeguard your personal information, which of the following is recommended
clear history when finished browsing
Which of the following terms is used to describe a small text file that a web server stores on you computer
cookie
gaining unauthorized access to confidential information through trust
social engineering
What term is used to describe the process of restricting access to certain material on the web
content filtering
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
digital security risk
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge
script kiddie
Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
cyberextortionist
Which of the following is someone who uses the internet or network to destroy or damage computers for political reasons
cyber terrorist
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following
malware
What is the term for a program that performs a repetitive task on a network
bot
A ________ is a type of assault to disrupt computer access to internet services
DOS Attack
Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
spoofing
Which of the following are used to record, save, and then execute a set of keystrokes and instructions repeatedly
macros
Which of the following is not a security product developer
adobe
Many websites require a user to enter a private combination of characters associated with a username that allows access to certain computer resources. What is the term for this combination of characters
Password
Which of the following is not a possessed object
PIN
The illegal copying of software music and video is known as
piracy
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount
site
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process
decryption
Which encryption algorithm replaces characters with other characters
substitution
What is another name for public key encryption
key encryption
Which of the following provides the mobile user with a secure connection to the company network server
VPN
How long can digital certificates be valid
two years
Which of the following kinds of certificate is a notice that guarantees a user or website is legit
Digital
Which of the following terms refers the making a copy of a file
backing up
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost or damaged
backup
With which of the following do users choose which folders and files to include in a backup
selective backup
Which of the following categories are the rights to which creators are entitled for their work
intellectual property
Which of the following gives authors and artists the exclusive rights to duplicate publish and sell their materials
copy right
Any illegal act involving a computer generally is referred to as a computer crime
True
A cyber-extortionist uses the internet or network to destroy or damage computers for political reasons
False
A rootkit can be a back door
True
Personal Firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion
True
Both Windows and Mac operating systems include firewall capabilities
True
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, or mobile device, or network
True
Most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
True
If a program or device has a default password, be sure to retain it.
False
PINs are not the same as passwords
False
Biometric objects are completely foolproof
False
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
True
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer
True
Secure sites typically use digital certificates along with security protocols.
True
Digital signatures often are used to ensure that an impostor is not participating in an Internet transaction
True
Any device that connects to the internet is susceptible to mobile malware
True
Websites often collect data about you so that they can customize advertisements and send you personalized email messages
True
Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart
True
Your browsing history is a list of all websites you have visited over a period of time
True
To remove spyware, users need to obtain a special program that can detect and delete it
True
To protect yourself from social engineering scams, shred all sensitive or confidential documents
True
Many businesses use spyware to limit employees’ web access
False
HIPAA protects individuals against the wrongful disclosure of their health information
True
The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits
True
It is illegal for employers to use software programs that monitor employees
False
If a company does not have a formal email policy, it can read email messages without employee notification
False
Many internet security programs include a firewall, antivirus program, and filtering capabilities combined.
True