Cosc 1301 Quiz 5 – Flashcards
Unlock all answers in this set
Unlock answersquestion
What term is used to describe the process of restricting access to certain material on the web?
answer
Content filtering
question
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
answer
Compaction
question
The term, PIN, is an acronym for which of the following?
answer
Personal Identification Number
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
answer
Decryption
question
How long can digital certificates be valid?
answer
Two-years
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
authoring ActiveX scripts
question
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
answer
an encryption algorithm
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
an IT code of conduct
question
HIPAA protects individuals against the wrongful disclosure of their health information
answer
True
question
Secure sites typically use digital certificates along with security protocols.
answer
True
question
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
answer
IP
question
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
answer
cyberextortionist
question
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
answer
Macros
question
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
answer
CAPTCHA
question
How much do fingerprint readers typically cost?
answer
less than $100
question
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.
answer
True
question
Which term is used to describe software used by cybercriminals?
answer
Crimeware
question
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
answer
malware
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
digital forensics
question
Which of the following statements is not true about Internet and network attacks?
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
malware
question
The term, botnet, means _____________.
answer
a group of compromised computers connected to a network that attacks other networks
question
Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.
answer
True
question
Which of the following does a new federal laboratory use in its high security areas?
answer
Iris recognition system
question
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
answer
transposition
question
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
answer
false
question
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
answer
an audit trail
question
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
answer
clickjacking
question
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
answer
hand geometry system
question
Programmers often build trapdoors into programs during system development.
answer
false
question
Which of the following does your college use to verify your identity?
answer
hand geometry system
question
Which of the following copies all of the files in a computer?
answer
full backup
question
If a company does not have a formal email policy, it can read email messages without employee notification.
answer
true
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
information privacy
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
ethical
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
answer
energy star
question
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
answer
passwords
question
Perpetrators of back doors trick their victims into interacting with phony websites.
answer
false
question
Which of the following is not a possessed object?
answer
PIN
question
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
answer
false
question
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.
answer
true
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
answer
backup
question
Into which of the following kinds of ports do external fingerprint readers plug?
answer
USB
question
What happens during a DDoS attack?
answer
A zombie army is used to attack computers or computer networks.
question
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
answer
true
question
One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
answer
false
question
If you are nervous, a signature might not match the one on file in a signature verification system.
answer
true
question
Any device that connects to the Internet is susceptible to mobile malware.
answer
true
question
Which of the following does your company use to track your time and attendance?
answer
hand geometry system
question
COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
answer
false
question
Which of the following categories are the rights to which creators are entitled for their work?
answer
intellectual property
question
It is illegal for employers to use software programs that monitor employees.
answer
false
question
Which of the following terms refers to making a copy of a file?
answer
backing up
question
Which of the following can be used to create a software registration number, sometimes illegally?
answer
keygen
question
Many businesses use which of the following to limit employees' web access?
answer
content filtering
question
The term firewall is _____________.
answer
hardware and/or software that protects a network's resources from intrusion
question
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
answer
Caesar cipher
question
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
answer
information theft
question
Which of the following statements is not a safeguard against the failure of hardware?
answer
device-tracking apps
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
answer
digital