CIS 101 Chapter 9 – Flashcards
25 test answers
Unlock all answers in this set
Unlock answers 25question
To protect against becoming infected with a computer virus or other type of malware, all computers should be equipped with _______.
answer
antivirus software
Unlock the answer
question
What act of sabotage attempts to flood a network server or Web server with so many requests for action that it shuts down or simply cannot handle legit request any longer?
answer
denial of Service (DoS) attack
Unlock the answer
question
What is a computer that is controlled by a hacker or other computer criminal?
answer
Bot
Unlock the answer
question
A crime that involves company insiders altering company programs to transfer small amounts of money from a very large number of transactions to an account controlled by a thief is knows as ______.
answer
salami shaving
Unlock the answer
question
The use of spoofed communications (typically e-mail messages) to gain credit card number and other personal data to be used for fraudulent purposes is known as_______.
answer
Phishing
Unlock the answer
question
Repeated threats or harassing behavior carried out via e-mail or another Internet communications method is known as _______.
answer
cyberstalking
Unlock the answer
question
When disposing of computer hardware, hard drives should be _______.
answer
wiped
Unlock the answer
question
The use of electronic means to collect a variety of in-depth information about an individual, such as name etc. is called _______.
answer
profiling
Unlock the answer
question
How the personal info you provide while visiting a Web site will be used is governed by the site's _______.
answer
privacy policy
Unlock the answer
question
Which technology refers to the ability of one computing device on a network to identify another device on the same network and determine its status?
answer
presence technology
Unlock the answer
question
What type of software is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer habit?
answer
computer monitoring software
Unlock the answer
question
___designed to withstand much more physical abuse than conventional devices
answer
ruggedized devices
Unlock the answer
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
answer
public
Unlock the answer
question
____ devices can withstand being dropped or submerged into water.
answer
semirugged
Unlock the answer
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
Proximity Cards
Unlock the answer
question
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
answer
USB security Tokens
Unlock the answer
question
A marketing activity that can be considered a privacy risk ______.
answer
electronic profiling
Unlock the answer
question
A fraud or scam carried out through the Internet is a form of ____.
answer
dot con
Unlock the answer
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.
answer
typosquatting
Unlock the answer
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ___.
answer
cable locks
Unlock the answer
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
hot site
Unlock the answer