CGS ch.5 – Cyber Security Flashcards

Unlock all answers in this set

Unlock answers
question
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
distributed
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
digital security risk
question
Internet advertising firms often use which of the following to collect information about users web browsing habits?
answer
spyware
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
question
Into which of the following kinds of ports do external fingerprint readers plug?
answer
USB
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
answer
Employee monitoring
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
information privacy
question
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
answer
Electronic communication privacy act
question
What is the term for a program that performs a repetitive task on a network?
answer
bot
question
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
answer
phishing
question
Which of the following can transmit germs?
answer
hand geometry systems
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
answer
backup
question
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer
electronic communication privacy act (ECPA)
question
With a three-generation backup policy, the grandparent is which of the following?
answer
oldest copy of the file
question
Which of the following is a federally funded Internet security research and development center?
answer
CERT/CC
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
they restore the files
question
Which of the following is not a security product developer?
answer
adobe
question
Which of the following copies all of the files in a computer?
answer
full backup
question
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
malware
question
Which of the following is not a possessed object?
answer
pins
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
answer
energy star
question
What is another name for public key encryption?
answer
asymmetric key encryption
question
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
script kiddie
question
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
answer
macros
question
Which of the following is an authorized person or company that issues and verifies digital certificates?
answer
certificate authority
question
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
answer
25
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
site
question
Many businesses use which of the following to limit employees' web access?
answer
content filtering
question
How long can digital certificates be valid?
answer
2 years
question
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
answer
cookie
question
Websites use which of the following to keep track of items in a user's shopping cart?
answer
session cookie
question
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
answer
cyberextortionist
question
With which of the following do users choose which folders and files to include in a backup?
answer
selective backup
question
Which of the following is the process of restricting access to certain material on the web?
answer
content filtering
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
answer
digital
question
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
answer
caesar cipher
question
Which of the following categories are the rights to which creators are entitled for their work?
answer
intellectual property
question
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
answer
copyright
question
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
answer
password
question
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
answer
IP
question
Which encryption algorithm inserts characters between existing characters?
answer
expansion
question
Which of the following provides the mobile user with a secure connection to the company network server?
answer
VPN
question
What is the term for a website that uses encryption techniques to protect its data?
answer
secure site
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New