Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCS M8

TermDefinition
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. DISTRIBUTED
A certificate ____ is an authorized person or company that issues and verifies digital certificates AUTHORITY
TRUE or FALSE: Intrusion detection software is quite inexpensive. FALSE
____ occurs when someone steals personal or confidential information. INFORMATION THEFT
TRUE or FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. TRUE
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate. DIGITAL
____ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. SPAM
TRUE or FALSE: Biometric devices are losing popularity as a security precaution. FALSE
TRUE or FALSE: Authentication verifies that an individual is a valid user. FALSE
TRUE or FALSE: An employee using an organization’s computer to track his or her child’s soccer league scores is an example of unauthorized access. FALSE
Computer ____ occurs when a computer consumes someone’s entire social life. ADDICTION
Personal computers, display devices, and printers should comply with guidelines of the ____ program. ENERGY STAR
Digital forensics is used by ____ ALL OTHER CHOICES ARE CORRECT
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server VPN ( VIRTUAL PRIVATE NETWORK)
Web sites use a ____ to keep track of items in a user’s shopping cart. SESSION COOKIES
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. SPOOFING
TRUE or FALSE: Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart. TRUE
A(n) ____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. ANTIVIRUS
A(n) IT code of conduct is a written guideline that helps determine whether a specific computer action is ____. ETHICAL
To read encrypted data, the recipient must ____, or decipher, it into a readable form. DECRYPT
____ is/are not considered spyware because a user knows it/they exist(s). COOKIES
TRUE or FALSE: Hardware theft is the act of stealing computer equipment. TRUE
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ERGONOMICS
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. FIREWALL
____ use is the use of a computer or its data for unapproved or possibly illegal activities. UNAUTHORIZED
An alternative to e-mail filtering is to purchase a(n) ____ program that attempts to remove a message before it reaches a user’s inbox ANTI-SPAM
Software ____ is the unauthorized and illegal duplication of copyrighted software. PIRACY
TRUE or FALSE: Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. FALSE
TRUE or FALSE: Session cookies usually do not expire and last indefinitely. FALSE
TRUE or FALSE: In order to safeguard personal information, you should not reply to messages sent by unknown sources for any reason. TRUE
Many Websites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers. NAME
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program. THEFT
A ____ is a small text file that a Web server stores on a user’s computer. COOKIE
Hardware theft and vandalism pose a threat to the home desktop computer user. FALSE
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. PRIVACY
One of the more common causes of ____ is an electrical power variation. SYSTEM FAILURE
Many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources. PASSWORD
TRUE or FALSE: One suggestion to safeguard personal information is to avoid shopping clubs and buyer cards. TRUE
Computer ____ are the moral guidelines that govern the use of computers and information systems. ETHICS
TRUE or FALSE: Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally. TRUE
Digital ____ is the discovery, collection, and analysis of evidence found on computers and networks. FORENSICS
Internet advertising firms often use ____ to collect information about users Web browsing habits SPYWARE
A(n) ____ is a numeric password either assigned by a company or selected by a user. PIN
TRUE or FALSE: Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer. TRUE
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches. INTRUSION
TRUE or FALSE: A surge protector absorbs small overvoltage's — generally without damage to the computer or equipment. TRUE
TRUE or FALSE: Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. TRUE
A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. SECURITY
A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. SCRIPT KIDDIE
Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. WAR DRIVING
TRUE or FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. TRUE
TRUE or FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion. TRUE
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. OVERVOLTAGE
TRUE or FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites. FALSE
TRUE or FALSE: Any illegal act involving a computer generally is referred to as a computer security risk. FALSE
TRUE or FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. TRUE
TRUE or FALSE: It is illegal for employers to use software programs that monitor employees. FALSE
Content ____ is the process of restricting access to certain material on the Web. FILTERING
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image CVS
TRUE or FALSE: For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. FALSE
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. MONITORING
Many businesses use ____ to limit employees’ Web access. CONTENT FILTERING
To prevent repetitive strain injury, take all of the following precautions except ____ use the heel of the hand as a pivot point while typing or using the mouse
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. RSI
TRUE or FALSE: Computer addiction is an untreatable illness. FALSE
TRUE or FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. TRUE
TRUE or FALSE: Undervoltage can cause equipment damage, but generally do not cause data loss. FALSE
A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. CYBERTERRORIST
TRUE or FALSE: A brownout is a complete power failure. FALSE
TRUE or FALSE: To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret. FALSE
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. TRUE
TRUE or FALSE: Many businesses use spyware to limit employees’ Web access. FALSE
TRUE or FALSE: A spyware program communicates information it collects to some inside source while a user is offline FALSE
Web ____ software is a program that restricts access to specified Web sites. FILTERING
TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. FALSE
TRUE or FALSE: The higher a surge protector’s joule rating, the poorer the protection: FALSE
TRUE or FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. FALSE
TRUE or FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. FALSE
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. NOISE
TRUE or FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. FALSE
A(n) ________ is someone who uses e-mail as a vehicle for extortion. CYBEREXTORTIONIST
A(n) ________ occurs when the electrical supply drops. UNDERVOLTAGE
TRUE or FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. TRUE
TRUE or FALSE: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. FALSE
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. Electronic Communications Privacy Act (ECPA)
TRUE or FALSE: Assume that because information is on the Web, it is accurate. FALSE
TRUE or FALSE: A spyware program communicates information it collects to some inside source while a user is offline. FALSE
TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. FALSE
TRUE or FALSE: The higher a surge protector’s joule rating, the poorer the protection: FALSE
TRUE or FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. FALSE
To ________ a file means to make a copy of it. BACK-UP
_________ which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate TLS
TRUE or FALSE: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. TRUE
TRUE or FALSE: An online UPS switches to battery power when a problem occurs in the power line. FALSE
A(n) ____ program secretly collects information about a user. SPYWARE
TRUE or FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. TRUE
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. SPYWARE
A system ________ is the prolonged malfunction of a computer FAILURE
TRUE or FALSE: A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail. FALSE
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. MALWARE
TRUE or FALSE: Biometric objects often are used in combination with personal identification numbers. FALSE
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. UPS
Created by: user-1762973
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards