CIS 130 exam 5 and 6 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following is the process of restricting access to certain material on the web?
answer
content filtering
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
substitution
question
Which of the following statements is not true about Internet and network attacks?
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
Which of the following is not a security product developer?
answer
Adobe
question
Which of the following best describes the term, cybercrime?
answer
online or Internet-based illegal acts
question
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
answer
cyberextortionist
question
What happens during a DDoS attack?
answer
A zombie army is used to attack computers or computer networks.
question
Which of the following statements is not true about software theft?
answer
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
answer
digital
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
They restore the files.
question
Which of the following can transmit germs?
answer
hand geometry systems
question
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
answer
product activation
question
Which of the following is the least likely motive for a DDoS?
answer
spoofing
question
Which of the following does a new federal laboratory use in its high security areas?
answer
iris recognition system
question
Which of the following terms is used to describe a small text file that a web server stores on your computer?
answer
a cookie
question
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
answer
hand geometry system
question
Which of the following is not a possessed object?
answer
PIN
question
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
answer
password
question
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use
answer
transposition
question
Into which of the following kinds of ports do external fingerprint readers plug?
answer
USB
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
answer
employee monitoring
question
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
answer
Electronic Communication Privacy Act
question
Websites use which of the following to keep track of items in a user's shopping cart?
answer
session cookie
question
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
answer
macros
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer
voice verification system
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
cracker
question
Internet advertising firms often use which of the following to collect information about users web browsing habits?
answer
spyware
question
Which of the following does your college use to verify your identity?
answer
hand geometry system
question
Which of the following copies all of the files in a computer?
answer
full backup
question
Which of the following is an authorized person or company that issues and verifies digital certificates?
answer
certificate authority
question
In order to safeguard your personal information, which of the following is recommended?
answer
Clear your history file when you are finished browsing.
question
Which of the following is a federally funded Internet security research and development center?
answer
CERT/CC
question
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
answer
compaction
question
Social engineering, as it pertains to computers, is _____________.
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
answer
information theft
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
answer
backup
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
site
question
With a three-generation backup policy, the grandparent is which of the following?
answer
oldest copy of the file
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
answer
ENERGY STAR
question
What is an AUP intended to do?
answer
outline computer activities for which the computer and network may or may not be used
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
Many businesses use which of the following to limit employees' web access?
answer
content filtering
question
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
answer
a digital signature
question
Which term is used to describe software used by cybercriminals?
answer
crimeware
question
Which of the following is NOT true of the new multi-core processor you have just purchased?
answer
Each processor core on the multi-core processor runs at a faster speed than a single-core processor.
question
Some computer and chip manufacturers use which of the following terms to refer to a personal computer processor chip?
answer
microprocessor
question
Which of the following is an alternate term for an adapter card?
answer
expansion card
question
What is the best analog for a 32-bit bus?
answer
a 32-lane highway
question
Which of the following is the component of the processor that performs arithmetic, comparison, and other operations?
answer
ALU
question
If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?
answer
a microchip
question
Memory access times can be measured in fractions of a second. When measuring memory access times, which of the following is the fastest?
answer
picosecond
question
Which of the following is the most common type of volatile memory?
answer
RAM
question
How many fans are typically in a desktop case?
answer
at least three
question
What are the roles of the control unit and the ALU?
answer
The control unit directs the operations of the ALU.
question
Which of the following rests below a laptop and protects the computer from overheating and also your lap from excessive heat?
answer
cooling pad
question
Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?
answer
Flash memory
question
Which of the following modules is a removable flash memory device that adds memory, communications, multimedia, security, and storage capabilities to computers
answer
ExpressCard
question
Which of the following is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched?
answer
computer chip
question
What type of circuit board is used to convert computer output into a video signal that displays an image on a monitor?
answer
graphics card
question
When a user runs an application, what transfers from a storage device to memory?
answer
instructions
question
The processor relies on which of the following to control the timing of all computer operations?
answer
system clock
question
What is memory access time?
answer
the amount of time it takes the processor to read data, instructions, and information from memory
question
What is unique about a multi-core processor?
answer
It is a single chip with two or more separate processor cores
question
Which of the following processors is a single chip with two or more separate processor cores?
answer
multi-core
question
When you examine a computer chip under a microscope, what will you see?
answer
integrated circuits
question
When your friend opened the case containing the electronic components of his computer, he saw the main circuit board for the computer. What is this circuit board called?
answer
motherboard
question
What numbering system uses only the numbers 0 and 1?
answer
binary system
question
What are three names for the electronic component that interprets and carries out the basic instructions that operate a computer?
answer
CPU, processor, central processing unit
question
Which kind of tablet positions the case below a keyboard, providing functionality similar to that of a laptop?
answer
convertible
question
Which of the following is the component of the processor that directs and coordinates most of the operations in the computer?
answer
control unit
question
On which of the following does battery life depend?
answer
usage
question
The role of memory to store both data and programs is known as which of the following concepts?
answer
stored program
question
When determining the amount of RAM necessary for a computer you wish to purchase, what should you consider?
answer
the types of software you plan to use
question
Which of the following interprets and carries out the basic instructions that operate a computer?
answer
CPU
question
Which of the following is true of synchronous DRAM (SDRAM) chips?
answer
They are synchronized to the system clock.
question
Which of the following is a case on a desktop that contains and protects the item shown in the accompanying figure and other electronic components?
answer
system unit
question
Which of the following is the least likely to need additional cooling?
answer
mobile devices
question
When 8 bits are grouped together as a unit, how many individual characters can these 8 bits represent?
answer
256
question
Your business is looking to rely on cloud computing services to specify the applications, security settings, and computing resources available to employees on their computer desktops. What is the term for this?
answer
Desktop as a Service
question
If you see eight numbers such as 01000101 grouped together and you are told these numbers represent the letter E, what is this combination of numbers called?
answer
a coding scheme
question
Which of the following are the two leading manufacturers of personal computer processor chips?
answer
Intel and AMD
question
You are going to purchase a mass-produced computer from your local computer store. Which of the following is likely a component you can customize?
answer
processor type
question
Which of the following means the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them?
answer
Plug and Play
question
Which of the following should you have if you plan to connect your computer or mobile device to a wired computer network?
answer
Ethernet port
question
Which component allows processors to perform at faster rates than those processors that do not have this component?
answer
advanced transfer cache
question
Which of the following refers to an environment of servers that house and provide access to resources users access via the Internet?
answer
cloud computing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New