Ch. 5 Exam
Unlock all answers in this set
Unlock answersquestion
            Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
answer
        macros
question
            What is the term for a program that performs a repetitive task on a network?
answer
        bot
question
            Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
answer
        backup
question
            Which of the following does your company use to track your time and attendance?
answer
        hand geometry system
question
            Which of the following terms refers to making a copy of a file?
answer
        backing up
question
            Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
        an IT code of conduct
question
            Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
        digital security risk
question
            Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
answer
        digital
question
            Which of the following does your new smartphone use to unlock the device?
answer
        face recognition system
question
            Which of the following is the process of restricting access to certain material on the web?
answer
        content filtering
question
            Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
answer
        a digital signature
question
            Which of the following copies all of the files in a computer?
answer
        full backup
question
            Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
answer
        phishing
question
            What is another name for public key encryption?
answer
        asymmetric key encryption
question
            Which of the following is not a security product developer?
answer
        Adobe
question
            Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
answer
        network
question
            What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
        digital forensics
question
            In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
        substitution
question
            Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
answer
        an encryption algorithm
question
            Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
        script kiddie
question
            With a three-generation backup policy, the grandparent is which of the following?
answer
        oldest copy of the file
question
            Which of the following does a new federal laboratory use in its high security areas?
answer
        iris recognition system
question
            Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
answer
        employee monitoring
question
            Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
        information privacy
question
            The term firewall is _____________.
answer
        hardware and/or software that protects a network's resources from intrusion
question
            Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
        cyberterrorist
question
            Which of the following terms means in a location separate from the computer site?
answer
        off-site
question
            Which of the following statements is not true about software theft?
answer
        A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
question
            What is an EULA intended to do?
answer
        license software for individual use
question
            Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
        spoofing
question
            The term, botnet, means _____________.
answer
        a group of compromised computers connected to a network that attacks other networks
question
            How long can digital certificates be valid?
answer
        two years
question
            Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
        malware
question
            When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
answer
        information theft
question
            Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer
        voice verification system
question
            Many businesses use which of the following to limit employees' web access?
answer
        content filtering
question
            Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
        site
question
            Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
answer
        an audit trail
question
            What term is used to describe the process of restricting access to certain material on the web?
answer
        content filtering
question
            The term, zombie, is _____________.
answer
        a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
            An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
        ethical
question
            Which of the following statements is not true about biometric devices?
answer
        Biometric devices are an unreliable method of identification and notification.
question
            Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
        spoofing
question
            What is an AUP intended to do?
answer
        outline computer activities for which the computer and network may or may not be used
question
            Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
        cracker
question
            In your encryption algorithm, you removed every third letter. Which algorithm did you use?
answer
        compaction
question
            In order to safeguard your personal information, which of the following is recommended?
answer
        Clear your history file when you are finished browsing.
question
            Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
        a worm
question
            Which term is used to describe software used by cybercriminals?
answer
        crimeware
question
            Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
        cyberterrorist
question
            Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
answer
        a rootkit
question
            Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
answer
        copyright
question
            Which of the following is an authorized person or company that issues and verifies digital certificates?
answer
        certificate authority
question
            Which of the following statements is not true about backing up?
answer
        With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
            Which of the following can transmit germs?
answer
        hand geometry systems
question
            A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
answer
        Biometric
question
            A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
answer
        Back Door
question
            Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students
answer
        Code of Conduct
question
            ____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.
answer
        Digital Forensics
question
            A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
answer
        Dos
question
            The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
answer
        Cyberwarfare
question
            To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
answer
        AUP
question
            A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
answer
        Disaster Recovery Plan
question
            A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.
answer
        Rootkit
question
            ____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.
answer
        Encryption
question
            A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
answer
        Digital
question
            ____________________ is the unauthorized and illegal duplication of copyrighted software.
answer
        Piracy
question
            A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.
answer
        Online Security Service
question
            The most common type of license included with software purchased by individual users is a(n) ____________________.
answer
        EULA
question
            A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.
answer
        Possessed
question
            A(n) ____________________ agreement is the right to use software.
answer
        License
question
            ____________________ occurs when someone steals personal or confidential information.
answer
        Information Theft
question
            A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
answer
        Access
