CIS 101 Chapter 9 – Flashcards

Unlock all answers in this set

Unlock answers
question
This is done for the value of the hardware itself
answer
Hardware theft
question
Using a computer to charge purchases to a stolen CC # is an example of ______.
answer
cybercrime
question
A student is authorized to access the Internet via a campus computer lab, but view porn is deemed off-limits. Doing so anyway would be considered _______.
answer
unauthorized use
question
What term refers to the act of breaking into a computer or network?
answer
hacking
question
To protect against becoming infected with a computer virus or other type of malware, all computers should be equipped with _______.
answer
antivirus software
question
What act of sabotage attempts to flood a network server or Web server with so many requests for action that it shuts down or simply cannot handle legit request any longer?
answer
denial of Service (DoS) attack
question
What is a computer that is controlled by a hacker or other computer criminal?
answer
Bot
question
A crime that involves company insiders altering company programs to transfer small amounts of money from a very large number of transactions to an account controlled by a thief is knows as ______.
answer
salami shaving
question
The use of spoofed communications (typically e-mail messages) to gain credit card number and other personal data to be used for fraudulent purposes is known as_______.
answer
Phishing
question
Repeated threats or harassing behavior carried out via e-mail or another Internet communications method is known as _______.
answer
cyberstalking
question
When disposing of computer hardware, hard drives should be _______.
answer
wiped
question
The use of electronic means to collect a variety of in-depth information about an individual, such as name etc. is called _______.
answer
profiling
question
How the personal info you provide while visiting a Web site will be used is governed by the site's _______.
answer
privacy policy
question
Which technology refers to the ability of one computing device on a network to identify another device on the same network and determine its status?
answer
presence technology
question
What type of software is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer habit?
answer
computer monitoring software
question
___designed to withstand much more physical abuse than conventional devices
answer
ruggedized devices
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
answer
public
question
____ devices can withstand being dropped or submerged into water.
answer
semirugged
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
Proximity Cards
question
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
answer
USB security Tokens
question
A marketing activity that can be considered a privacy risk ______.
answer
electronic profiling
question
A fraud or scam carried out through the Internet is a form of ____.
answer
dot con
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.
answer
typosquatting
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ___.
answer
cable locks
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
hot site
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New