CH. 5 COSC – Flashcards

Unlock all answers in this set

Unlock answers
question
What is another name for public key encryption?
answer
asymmetric key encryption
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
ethical
question
Which of the following best describes the term, cybercrime?
answer
online or Internet-based illegal acts
question
Which of the following does your financial institution use to reduce fraud?
answer
signature verification system
question
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
answer
transposition
question
What is the term for a website that uses encryption techniques to protect its data?
answer
secure site
question
Which of the following can be used to create a software registration number, sometimes illegally?
answer
keygen
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
question
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
malware
question
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
answer
product activation
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
substitution
question
Which of the following does your college use to verify your identity?
answer
hand geometry system
question
Which of the following statements is not true about biometric devices?
answer
Biometric devices are an unreliable method of identification and notification.
question
Which of the following is not a security product developer?
answer
Adobe
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
cracker
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
Social engineering, as it pertains to computers, is _____________.
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
What term is used to describe the process of restricting access to certain material on the web?
answer
content filtering
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
answer
employee monitoring
question
Which of the following is the process of restricting access to certain material on the web?
answer
content filtering
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
They restore the files.
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
script kiddie
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
site
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
authoring ActiveX scripts
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New