MIS chapter 5 – Flashcards

Flashcard maker : Ember Wagner
cookie
Which of the following terms is used to describe a small text file that a web server stores on your computer?

A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
Which of the following statements is not true about software theft?

license software for individual use
What is an EULA intended to do?

Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Which of the following statements is not true about Internet and network attacks?

VPN
Which of the following provides the mobile user with a secure connection to the company network server?

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Social engineering, as it pertains to computers, is _____________.

Caesar Cipher
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

True
T/F Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

True
T/F Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

True
T/F Any device that connects to the Internet is susceptible to mobile malware.

bot
What is the term for a program that performs a repetitive task on a network?

False
T/F Proximity sharing gives websites access to your current location.

Adobe
Which of the following is not a security product developer?

content filtering
Which of the following is the process of restricting access to certain material on the web?

content filtering
Many businesses use which of the following to limit employees’ web access?

The term fair use refers to the rights which creators are entitled for their work.
Which of the following statements is not true about intellectual property rights?

information theft
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

False
T/F Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

True
T/F Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

authoring ActiveX scripts
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

digital forensics
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

True
T/F If you are nervous, a signature might not match the one on file in a signature verification system

outline computer activities for which the computer and network may or may not be used
What is an AUP intended to do?

With a selective backup, all of the files in the computer automatically are chosen to be copied.
Which of the following statements is not true about backing up?

True
T/F Secure sites typically use digital certificates along with security protocols.

True
T/F Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

VPN
Which of the following provides the mobile user with a secure connection to the company network server?

IP
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

True
T/F A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

True
T/F Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined

CAPTCHA
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

Macros
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

USB
Into which of the following kinds of ports do external fingerprint readers plug?

full backup
Which of the following copies all of the files in a computer?

False
T/F The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

Clear your history file when you are finished browsing.
In order to safeguard your personal information, which of the following is recommended?

zombie
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Electronic Communication Privacy Act
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

voice verification system
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

True
T/F As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

spoofing
Which of the following is the least likely motive for a DDoS?

they restore the files
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

False
T/F Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

False
T/F Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

True
T/F Secure sites typically use digital certificates along with security protocols.

True
T/F Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart as shown in the accompanying figure.

True
T/F Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

signature verification system
Which of the following does your financial institution use to reduce fraud?

secure site
What is the term for a website that uses encryption techniques to protect its data?

True
T/F The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

substitution
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

CERT/CC
Which of the following is a federally funded Internet security research and development center?

copyright
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

off-site
Which of the following terms means in a location separate from the computer site?

certificate authority
Which of the following is an authorized person or company that issues and verifies digital certificates

25
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

A zombie army is used to attack computers or computer networks.
What happens during a DDoS attack?

True
T/F To remove spyware, users need to obtain a special program that can detect and delete it

hand geometry system
Which of the following does your company use to track your time and attendance?

backing up
Which of the following terms refers to making a copy of a file?

IT code of conduct
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

digital security risk
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

asymmetric key encription
What is another name for public key encryption?

network
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

an encryption algorithm
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

script kiddie
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

grandfather
oldest copy of the file

iris recognition system
Which of the following does a new federal laboratory use in its high security areas?

employee monitoring
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

information privacy
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

spoofing
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

botnet
a group of compromised computers connected to a network that attacks other networks

2 years
How long can digital certificates be valid?

malware
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

voice verification system
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

site
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

ethical
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

Biometric devices are an unreliable method of identification and notification.
Which of the following statements is not true about biometric devices?

cracker
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

compaction
In your encryption algorithm, you removed every third letter. Which algorithm did you use?

crimeware
Which term is used to describe software used by cybercriminals?

biometric
A(n) ____________________ device authenticates a person’s identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Back door
A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

code of conduct
Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students

Dos
A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

encryption
____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

piracy
____________________ is the unauthorized and illegal duplication of copyrighted software.

online security service
a(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

possessed
A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

EULA
The most common type of license included with software purchased by individual users is a(n) ____________________.

license
A(n) ____________________ agreement is the right to use software.

access
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

session cookie
Websites use which of the following to keep track of items in a user’s shopping cart?

selective backup
With which of the following do users choose which folders and files to include in a backup?

spyware
Internet advertising firms often use which of the following to collect information about users web browsing habits?

expansion
Which encryption algorithm inserts characters between existing characters?

decryption
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

distributed
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

less than $100
How much do fingerprint readers typically cost?

energy star
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

SSID
A wireless network should be configured so that it does not broadcast a network name, known as a(n) ___.

three-generation backup
Some users implement a(n) ___ policy to preserve three copies of important files.

compaction
A(n) ___ encryption algorithm removes characters and stores them elsewhere.

secure
Web address of ___ sites often begin with https instead of http.

Ciphertext
In the encryption process, the encrypted (scrambled) data is called ___.

payload
The ___ is the destructive even or prank malware is intended to deliver

low audio quality
Which of the following is NOT a symptom of a computer or mobile device functioning as a zombie?

hand geometry system
Which of the following does your college use to verify your identity?

keygen
Which of the following can be used to create a software registration number, sometimes illegally?

digital signature
Which of the following terms is used to describe an encrypted code that a person, Web site, or organization uses to verify the identity of the message sender?

True
T/F FOIA enables public access to most government records.

False
T/F The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

False
T/F COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

False
T/F Programmers often build trapdoors into programs during system development.

product activation
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

UPS
Which of the following statements is not a safeguard against the failure of hardware?

True
T/F HIPAA protects individuals against the wrongful disclosure of their health information.

True
T/F The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

True
T/F Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

False
T/F Proximity sharing gives websites access to your current location.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New