click below
click below
Normal Size Small Size show me how
CCS M8
Term | Definition |
---|---|
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. | DISTRIBUTED |
A certificate ____ is an authorized person or company that issues and verifies digital certificates | AUTHORITY |
TRUE or FALSE: Intrusion detection software is quite inexpensive. | FALSE |
____ occurs when someone steals personal or confidential information. | INFORMATION THEFT |
TRUE or FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. | TRUE |
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate. | DIGITAL |
____ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. | SPAM |
TRUE or FALSE: Biometric devices are losing popularity as a security precaution. | FALSE |
TRUE or FALSE: Authentication verifies that an individual is a valid user. | FALSE |
TRUE or FALSE: An employee using an organization’s computer to track his or her child’s soccer league scores is an example of unauthorized access. | FALSE |
Computer ____ occurs when a computer consumes someone’s entire social life. | ADDICTION |
Personal computers, display devices, and printers should comply with guidelines of the ____ program. | ENERGY STAR |
Digital forensics is used by ____ | ALL OTHER CHOICES ARE CORRECT |
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server | VPN ( VIRTUAL PRIVATE NETWORK) |
Web sites use a ____ to keep track of items in a user’s shopping cart. | SESSION COOKIES |
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. | SPOOFING |
TRUE or FALSE: Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart. | TRUE |
A(n) ____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. | ANTIVIRUS |
A(n) IT code of conduct is a written guideline that helps determine whether a specific computer action is ____. | ETHICAL |
To read encrypted data, the recipient must ____, or decipher, it into a readable form. | DECRYPT |
____ is/are not considered spyware because a user knows it/they exist(s). | COOKIES |
TRUE or FALSE: Hardware theft is the act of stealing computer equipment. | TRUE |
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. | ERGONOMICS |
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. | FIREWALL |
____ use is the use of a computer or its data for unapproved or possibly illegal activities. | UNAUTHORIZED |
An alternative to e-mail filtering is to purchase a(n) ____ program that attempts to remove a message before it reaches a user’s inbox | ANTI-SPAM |
Software ____ is the unauthorized and illegal duplication of copyrighted software. | PIRACY |
TRUE or FALSE: Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. | FALSE |
TRUE or FALSE: Session cookies usually do not expire and last indefinitely. | FALSE |
TRUE or FALSE: In order to safeguard personal information, you should not reply to messages sent by unknown sources for any reason. | TRUE |
Many Websites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers. | NAME |
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program. | THEFT |
A ____ is a small text file that a Web server stores on a user’s computer. | COOKIE |
Hardware theft and vandalism pose a threat to the home desktop computer user. | FALSE |
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. | PRIVACY |
One of the more common causes of ____ is an electrical power variation. | SYSTEM FAILURE |
Many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources. | PASSWORD |
TRUE or FALSE: One suggestion to safeguard personal information is to avoid shopping clubs and buyer cards. | TRUE |
Computer ____ are the moral guidelines that govern the use of computers and information systems. | ETHICS |
TRUE or FALSE: Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally. | TRUE |
Digital ____ is the discovery, collection, and analysis of evidence found on computers and networks. | FORENSICS |
Internet advertising firms often use ____ to collect information about users Web browsing habits | SPYWARE |
A(n) ____ is a numeric password either assigned by a company or selected by a user. | PIN |
TRUE or FALSE: Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer. | TRUE |
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches. | INTRUSION |
TRUE or FALSE: A surge protector absorbs small overvoltage's — generally without damage to the computer or equipment. | TRUE |
TRUE or FALSE: Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. | TRUE |
A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. | SECURITY |
A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. | SCRIPT KIDDIE |
Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. | WAR DRIVING |
TRUE or FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. | TRUE |
TRUE or FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion. | TRUE |
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. | OVERVOLTAGE |
TRUE or FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites. | FALSE |
TRUE or FALSE: Any illegal act involving a computer generally is referred to as a computer security risk. | FALSE |
TRUE or FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. | TRUE |
TRUE or FALSE: It is illegal for employers to use software programs that monitor employees. | FALSE |
Content ____ is the process of restricting access to certain material on the Web. | FILTERING |
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image | CVS |
TRUE or FALSE: For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. | FALSE |
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. | MONITORING |
Many businesses use ____ to limit employees’ Web access. | CONTENT FILTERING |
To prevent repetitive strain injury, take all of the following precautions except ____ | use the heel of the hand as a pivot point while typing or using the mouse |
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. | RSI |
TRUE or FALSE: Computer addiction is an untreatable illness. | FALSE |
TRUE or FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. | TRUE |
TRUE or FALSE: Undervoltage can cause equipment damage, but generally do not cause data loss. | FALSE |
A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. | CYBERTERRORIST |
TRUE or FALSE: A brownout is a complete power failure. | FALSE |
TRUE or FALSE: To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret. | FALSE |
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. | TRUE |
TRUE or FALSE: Many businesses use spyware to limit employees’ Web access. | FALSE |
TRUE or FALSE: A spyware program communicates information it collects to some inside source while a user is offline | FALSE |
Web ____ software is a program that restricts access to specified Web sites. | FILTERING |
TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. | FALSE |
TRUE or FALSE: The higher a surge protector’s joule rating, the poorer the protection: | FALSE |
TRUE or FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. | FALSE |
TRUE or FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. | FALSE |
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | NOISE |
TRUE or FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. | FALSE |
A(n) ________ is someone who uses e-mail as a vehicle for extortion. | CYBEREXTORTIONIST |
A(n) ________ occurs when the electrical supply drops. | UNDERVOLTAGE |
TRUE or FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. | TRUE |
TRUE or FALSE: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. | FALSE |
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. | Electronic Communications Privacy Act (ECPA) |
TRUE or FALSE: Assume that because information is on the Web, it is accurate. | FALSE |
TRUE or FALSE: A spyware program communicates information it collects to some inside source while a user is offline. | FALSE |
TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. | FALSE |
TRUE or FALSE: The higher a surge protector’s joule rating, the poorer the protection: | FALSE |
TRUE or FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. | FALSE |
To ________ a file means to make a copy of it. | BACK-UP |
_________ which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate | TLS |
TRUE or FALSE: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. | TRUE |
TRUE or FALSE: An online UPS switches to battery power when a problem occurs in the power line. | FALSE |
A(n) ____ program secretly collects information about a user. | SPYWARE |
TRUE or FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. | TRUE |
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. | SPYWARE |
A system ________ is the prolonged malfunction of a computer | FAILURE |
TRUE or FALSE: A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail. | FALSE |
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. | MALWARE |
TRUE or FALSE: Biometric objects often are used in combination with personal identification numbers. | FALSE |
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. | UPS |