Computer Security and Ethics Exam. Computer software network security. Define cyberextortionist.

Unlock all answers in this set

Unlock answers
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
Computer Security Risk
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
script kiddie
question
Which of the following is someone who uses e-mail as a vehicle for extortion?
answer
cyberextortionist
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?
answer
malware
question
A particularly devastating type of DoS attack is which kind of DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks?
answer
distributed
question
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
Spoofing
question
Which of the following software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches?
answer
Intrusion detection
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
decryption
question
What is the term for the prolonged malfunction of a computer?
answer
system failure
question
Which of the following terms means in a location separate from the computer site?
answer
Offsite
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
answer
Backup
question
Some perpetrators use a technique in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. What is the term this technique?
answer
War driving
question
Which of the following is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace?
answer
Ergonomics
question
Which of the following occurs when a computer consumes someone's entire social life?
answer
computer addiction
question
Which of the following category of rights are the rights to which creators are entitled for their work?
answer
Intellectual property
question
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
answer
copyright
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
ethical
question
Andrew wants to start a company based off of his new idea. His idea involves a new technology that will decrease the electric waste of computers and make them more efficient. This idea is known as?
answer
Green Computing
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
information privacy
question
Jim wants something outside of the company's network that controls which communications pass into the network. What would you recommend for Jim?
answer
Proxy Server
question
Many businesses use which of the following to limit employees' Web access?
answer
Content filtering
question
Which of the following is the process of restricting access to certain material on the Web?
answer
Content filtering
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited?
answer
Employee monitoring
question
Which of the following best describes the term, cybercrime?
answer
online or Internet-based illegal acts
question
Which term is used to describe software used by cybercriminals?
answer
crimeware
question
Which of the following statements is not true about Internet and network attacks?
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
answer
malware
question
Define the term, payload, as it pertains to computer crime.
answer
the destructive event or prank the program is intended to deliver
question
Which of the following statements is not true about protecting yourself against computer viruses?
answer
If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe to open it because you know the sender.
question
Define the term zombie.
answer
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
question
What happens during a DDoS attack?
answer
A zombie army is used to attack computers or computer networks.
question
Define the term back door, as it refers to computer crime.
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
What is an EULA intended to do?
answer
license software for individual
question
Which of the following statements is not true about user names and passwords?
answer
Pass phrases are less secure because they contain words.
question
The term, PIN, is an acronym for which of the following?
answer
Personal identification number
question
Which of the following statements is not true about biometric devices?
answer
Biometric devices are an unreliable method of identification and notification.
question
Which of the following statements is not true about hardware theft and vandalism?
answer
Home desktop computer users are especially vulnerable to hardware theft and vandalism.
question
Which of the following statements is not true about software theft?
answer
A keygen distributes usernames and passwords to those who register their legally purchased copies of a software program.
question
What is a power surge?
answer
when incoming electrical power increases more than five percent above normal volts
question
Which of the following statements is not true about backing up?
answer
With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
Which of the following statements is not true about wireless security?
answer
WPA is the most recent network security standard and is more sophisticated than 802.11i.
question
You set up your computer so that your elbows are at about 90 degrees and your viewing distance is 18 to 28 inches. What scientific principle are you using to ensure your comfort and safety while using the computer?
answer
ergonomics
question
Which of the following statements is not true about intellectual property rights?
answer
The term fair use specifies how material may be used and helps to define intellectual property rights.
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
an IT code of conduct
question
What is the purpose of a PUE?
answer
to measure how much power enters the computer facility against the amount of power required to run the computers
question
Define social engineering as it pertains to computers.
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
What term is used to describe the process of restricting access to certain material on the Web?
answer
data mining
question
Which vendor is the world's largest dedicated security technology company?
answer
McAfee
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New