Quiz 5 – Flashcard Answers
Flashcard maker : Isabella Parker
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
spoofing
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
product activation
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
digital forensics
Which of the following can be used to create a software registration number, sometimes illegally?
keygen
How long can digital certificates be valid?
two years
What is the term for a program that performs a repetitive task on a network?
bot
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
audit trail
Which of the following is the process of restricting access to certain material on the web?
content filtering
Which of the following does your company use to track your time and attendance?
hand geometry
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
clickjacking
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Electronic Communications Privacy ACT (ECPA)
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
The term back door, as it refers to computer crime, is _____________.
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
Which of the following does your college use to verify your identity?
face recognition ??
Which of the following is a program or set of instructions in a program that allows users to bypass security controls?
back door
With which of the following do users choose which folders and files to include in a backup?
selective backup
Which of the following categories are the rights to which creators are entitled for their work?
intellectual property
The term CAPTCHA is _____________.
a series of distorted characters that a user is required to enter correctly to continue using a website
The term firewall is _____________.
hardware and/or software that protects a network’s resources from intrusion
Which of the following is a federally funded Internet security research and development center?
CERT/CC
Internet advertising firms often use which of the following to collect information about users web browsing habits?
Spyware
Which of the following is an authorized person or company that issues and verifies digital certificates?
certificate authority
Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts