Cis Chapter 5 Test Questions
58 test answers
Unlock all answers in this set
Unlock answers 58question
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer
Electronic Communications Privacy Act (ECPA)
Unlock the answer
question
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail? Electronic Communications Privacy Act (ECPA) Fair Credit Reporting Act Computer Fraud and Abuse Act Computer Matching and Privacy Protection Act
answer
Electronic Communications Privacy Act (ECPA)
Unlock the answer
question
Many businesses use which of the following to limit employees' web access?
answer
content filtering
Unlock the answer
question
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program? war driving spitting clickjacking spimming
answer
clickjacking
Unlock the answer
question
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
answer
product activation
Unlock the answer
question
Which of the following can transmit germs? iris recognition systems digital forensics systems face recognition systems hand geometry systems
answer
hand geometry systems
Unlock the answer
question
Which of the following does a new federal laboratory use in its high security areas? signature verification system digital forensics system hand geometry system iris recognition system
answer
iris recognition ssytem
Unlock the answer
question
The term firewall is
answer
hardware and/or software that protects a network's resources from intrusion
Unlock the answer
question
Which of the following statements is not a safeguard against the failure of hardware? surge protectors fault-tolerant computers device-tracking apps UPS
answer
device-tracking apps
Unlock the answer
question
Many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
answer
password
Unlock the answer
question
Which term is used to describe software used by cybercriminals?
answer
crimeware
Unlock the answer
question
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? rebuking spoofing transmitting victimizing
answer
spoofing
Unlock the answer
question
Which of the following best describes the term, cybercrime? online or Internet-based illegal acts any illegal act involving a computer a type of gaming software that simulates criminal acts using the Internet to apprehend and prosecute criminals
answer
online or Internet-based illegal acts
Unlock the answer
question
Which of the following is an authorized person or company that issues and verifies digital certificates? certificate authority certificate agency certificate office certificate bureau
answer
certificate authority
Unlock the answer
question
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? spam spit phishing spyware
answer
phishing
Unlock the answer
question
The term, payload, as it pertains to computer crime, is defined as
answer
the destructive event or prank the program is intended to deliver
Unlock the answer
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service? digital forensics system voice verification system iris recognition system hand geometry system
answer
voice verification system
Unlock the answer
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
answer
They restore the files
Unlock the answer
question
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure? hacker script kiddie cyberextortionist cyberterrorist
answer
cyberextortionist
Unlock the answer
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? a software license an IT code of conduct digital rights management fair use
answer
an IT code of conduct
Unlock the answer
question
Which of the following statements is not true about backing up? *Backup programs are available from many sources. *Continuous data protection typically is used only by large enterprises. *With a selective backup, all of the files in the computer automatically are chosen to be copied. *A backup is a duplicate of a file, program, or disk.
answer
With a selective backup, all of the files in the computer automatically are chosen to be copied.
Unlock the answer
question
Which of the following is the process of restricting access to certain material on the web? text remastering content filtering indexing material masking
answer
content filtering
Unlock the answer
question
Which of the following is not a possessed object? PIN badge smart card key
answer
PIN
Unlock the answer
question
Social engineering, as it pertains to computers, is
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Unlock the answer
question
Into which of the following kinds of ports do external fingerprint readers plug? parallel MIDI USB serial
answer
USB
Unlock the answer
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited? manager filtering employee monitoring job spamming employee indexing
answer
employee monitoring
Unlock the answer
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
answer
site
Unlock the answer
question
What is the term for a program that performs a repetitive task on a network?
answer
bot
Unlock the answer
question
Websites use which of the following to keep track of items in a user's shopping cart? session cookie zombie adware shopping bot
answer
session cookie
Unlock the answer
question
Internet advertising firms often use which of the following to collect information about users web browsing habits? comware postware spyware billware
answer
spyware
Unlock the answer
question
The term, PIN, is an acronym for what?
answer
personal identification number
Unlock the answer
question
The term CAPTCHA is
answer
a series of distorted characters that a user is required to enter correctly to continue using a website
Unlock the answer
question
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
answer
CAPTCHA
Unlock the answer
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? assigned secure protected digital
answer
digital
Unlock the answer
question
Which of the following is, a small text file that a web server stores on a user's computer? worm spike cookie payload
answer
cookie
Unlock the answer
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs? ENERGY STAR SECURE ELECTRONICS ACCEPTABLE USE GREEN COMPUTING
answer
ENERGY STAR
Unlock the answer
question
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? a decipher module a translation tool an encryption algorithm a decryption key
answer
an encryption algorithm
Unlock the answer
question
Which of the following statements is not true about Internet and network attacks? 1. No central administrator is present on the Internet. 2. It is usually the responsibility of the network administrators to take measures to protect a network from security risks. 3. Information kept on an organization's premises has a higher security risk than information transmitted over networks. 4. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
Unlock the answer
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? spoofing phishing veiling costuming
answer
spoofing
Unlock the answer
question
The term, zombie, is
answer
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
Unlock the answer
question
The term, botnet, mean
answer
a group of compromised computers connected to a network that attacks other networks
Unlock the answer
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet? sending spam via email spreading viruses committing a distributed denial of service attack authoring ActiveX scripts
answer
authoring ActiveX scripts
Unlock the answer
question
The term back door, as it refers to computer crime, is
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
Unlock the answer
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is
answer
ethical
Unlock the answer
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed? restored file bot IP file backup
answer
backup
Unlock the answer
question
Which of the following statements is not true about intellectual property rights? 1. The term fair use refers to the rights which creators are entitled for their work. 2. Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more. 3. A copyright protects any tangible form of expression. 4. Digital rights management is a strategy designed to prevent illegal distribution of digital content.
answer
The term fair use refers to the rights which creators are entitled for their work.
Unlock the answer
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
Unlock the answer
question
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender? a certificate authority a digital signature an encryption key a hash
answer
a digital signature
Unlock the answer
question
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
answer
network
Unlock the answer
question
Which of the following is the least likely motive for a DDoS? political anger spoofing extortion negative recognition
answer
spoofing
Unlock the answer
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
answer
substitution
Unlock the answer
question
How long can digital certificates be valid?
answer
two years
Unlock the answer
question
Which of the following can be used to create a software registration number, sometimes illegally? BSA decryption key keygen public key
answer
keygen
Unlock the answer
question
What is another name for public key encryption? controlled key encryption virtual key encryption asymmetric key encryption secure key encryption
answer
asymmetric key encryption
Unlock the answer