ITE – Ch. 10
Unlock all answers in this set
Unlock answersquestion
Antivirus programs look for a specific pattern of virus code. What is this pattern called?
answer
virus signature
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
digital forensics
question
Define the term firewall.
answer
hardware and/or software that protects a network's resources from intrusion
question
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
answer
malware
question
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
answer
a rootkit
question
Which of the following terms is used to describe a security measure that defines who can use a computer, when they can use it, and what actions they can take while using it?
answer
an access control
question
Tendonitis is an example of what type of computer-related disorder?
answer
RSI (Repetitive Strain Injury)
question
Define the term CAPTCHA.
answer
a series of distorted characters that a user is required to enter correctly to continue using a Web site
question
What is the ENERGY STAR program designed to do?
answer
to encourage manufacturers to create energy-efficient devices
question
*As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is known as what?
answer
spam
question
What is an AUP (Acceptable Use Policy (Terms of Service)) intended to do?
answer
outline computer activities for which the computer and network may or may not be used
question
Define the term botnet.
answer
a group of compromised computers connected to a network that attacks other networks
question
*As shown in the accompanying figure, many Web sites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
answer
password
question
Which of the following statements is not true about wireless security?
answer
WPA is the most recent network security standard and is more sophisticated than 802.11i.
question
The term, PIN, is an acronym for which of the following?
answer
personal identification number
question
Which of the following kinds of software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure?
answer
Intrusion detection
question
What happens during a DoS (denial of service) attack?
answer
An unsuspecting computer is used to sent an influx of confusing data messages or useless network traffic.
question
Which of the following statements is not true about user names and passwords?
answer
Multiuser systems typically provide users with their own passwords.
question
*As shown in the accompanying figure, all networked and online computer users should implement which of the following?
answer
firewall solution
question
Which of the following statements is not true about hardware theft and vandalism?
answer
Because of their weight and size, notebook computers are easy to conceal or secure, making them less vulnerable to theft.
question
What is an RTLS (real time location service) used for?
answer
to track and identify the location of high-risk or high-value items
question
In order to safeguard your personal information, which of the following is recommended?
answer
Clear your history file when you are finished browsing.
question
Which of the following statements is not true about backing up?
answer
With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
As related to the use of computers, which of the following terms is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others?
answer
social engineering
question
Which of the following terms is used to describe a scam in which a Web site includes a button, image or link that contains a malicious program?
answer
clickjacking
question
*To protect themselves from software piracy, software manufacturers issue an agreement like the one shown in the accompanying figure, which gives users the right to use the software. What is the term for this kind of agreement?
answer
license agreement
question
If a password used on a site like the one shown in the accompanying figure is 4 characters long, what is the average time it would take a computer to discover the password?
answer
1 second
question
Define the term, back door, as it refers to computer crime.
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
question
Which of the following best describes the term, cybercrime?
answer
online or Internet-based illegal acts
question
Define social engineering as it pertains to computers.
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
Any illegal act involving a computer generally is referred to as which of the following?
answer
computer crime
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
a worm
question
As related to the use of computers, which of the following terms is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others?
answer
social engineering
question
What kind of device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic?
answer
biometric
question
Which of the following statements is NOT true about biometric devices?
answer
With a touch screen, biometric payment can be used to make purchases over the Internet.
question
Define the term payload, as it pertains to computer crime.
answer
the destructive event or prank the program is intended to deliver
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
Some vendors or employers use a program to collect information about program usage or employees. What is this type of program called?
answer
a spyware
question
When an antivirus program cannot remove an infection from a file, it moves the file to a separate area of the hard disk until the infection can be removed. What is this area called?
answer
quarantine
question
Which of the following statements is not true about protecting yourself against computer viruses?
answer
If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe to open it because you know the sender.
question
Which of the following terms is used to describe a scam in which a perpetrator attempts to obtain your personal and financial information via spoofing?
answer
pharming
question
As shown in the accompanying figure, which of the following is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet?
answer
firewall
question
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
answer
an audit trail
question
Which of the following statements is not true about intellectual property rights?
answer
The term fair use specifies how material may be used and helps to define intellectual property rights.
question
Define the term zombie.
answer
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
question
What is an EULA intended to do?
answer
license software for individual use