Security Quiz – Flashcards
20 test answers
Unlock all answers in this set
Unlock answers 20question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
Unlock the answer
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
Unlock the answer
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
Unlock the answer
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
Unlock the answer
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
Unlock the answer
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
Unlock the answer
question
Twitter is a ____ site.
answer
microblogging
Unlock the answer
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
Unlock the answer
question
Which of the following is one realistic way to promote Internet security?
answer
Select strong passwords and change them regularly.
Unlock the answer
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
Unlock the answer
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
Unlock the answer
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phishing
Unlock the answer
question
Of the following, ____ contains the most information about citizens of the United States.
answer
LexisNexis
Unlock the answer
question
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy.
answer
transparent
Unlock the answer
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
Unlock the answer
question
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.
answer
Privacy Act of 1974
Unlock the answer