CH. 5 COSC – Flashcards
Unlock all answers in this set
Unlock answersquestion
            What is another name for public key encryption?
answer
        asymmetric key encryption
question
            An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
        ethical
question
            Which of the following best describes the term, cybercrime?
answer
        online or Internet-based illegal acts
question
            Which of the following does your financial institution use to reduce fraud?
answer
        signature verification system
question
            In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
answer
        transposition
question
            What is the term for a website that uses encryption techniques to protect its data?
answer
        secure site
question
            Which of the following can be used to create a software registration number, sometimes illegally?
answer
        keygen
question
            To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
        decryption
question
            Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
        malware
question
            You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
answer
        product activation
question
            In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
        substitution
question
            Which of the following does your college use to verify your identity?
answer
        hand geometry system
question
            Which of the following statements is not true about biometric devices?
answer
        Biometric devices are an unreliable method of identification and notification.
question
            Which of the following is not a security product developer?
answer
        Adobe
question
            Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
        cracker
question
            Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
        cyberterrorist
question
            Social engineering, as it pertains to computers, is _____________.
answer
        gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
            What term is used to describe the process of restricting access to certain material on the web?
answer
        content filtering
question
            Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
        spoofing
question
            Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
answer
        employee monitoring
question
            Which of the following is the process of restricting access to certain material on the web?
answer
        content filtering
question
            In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
        They restore the files.
question
            Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
        script kiddie
question
            Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
        site
question
            A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
        authoring ActiveX scripts