M06 Reading Q Ch 6 – Flashcards

Unlock all answers in this set

Unlock answers
question
A UPS is designed to provide enough power for a computer to remain briefly powered up if the electricity goes off.
answer
True
question
A firewall creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
answer
True
question
FDE stands for ____.
answer
full disk encryption
question
A fingerprint reader is an example of a(n) ____ access system.
answer
biometric
question
The term hot site is related most closely to the term ____.
answer
disaster recovery plan
question
___ refers to following a predesignated procedure to remove yourself from marketing lists.
answer
Opting out
question
A computer worm does not infect other computer files on the infected computer to replicate itself; it spreads by creating copies of its code and sending those copies to other computers via a network.
answer
True
question
All 50 U.S. states have made cyberstalking illegal
answer
True
question
A hard drive that uses STP is often referred to as a self-encrypting hard drive.
answer
False
question
DDoS attacks are typically performed by botnets.
answer
True
question
Collecting in-depth information about an individual is known as spamming.
answer
False
question
Pharming is the use of a spoofed email message to trick the recipient into revealing sensitive personal information.
answer
False
question
The accompanying figure represents a DoS attack.
answer
True
question
Case-Based Critical Thinking Questions Case 6-2 Each question contains a brief list of things commonly associated with daily life. Examine the list, then choose the answer that most closely correlates to the list. A great new stock deal, a "send this to 20 of your friends" note, unwanted advertising
answer
c. spam
question
____ is a generic term that refers to any type of malicious software.
answer
d. Malware
question
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. Lastly, you are planning to do a lot of business travel in the near future. You will be bringing your laptop computer with you. You look into ways to secure the information on your computer, and decide that the most secure is to ____.
answer
b. install a hard drive that uses FDE
question
A ____ is a type of malware that masquerades as something else
answer
b. Trojan horse
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New