click below
click below
Normal Size Small Size show me how
CIS 110 Chapter 5
2014 Digital Safety and Security
| Question | Answer |
|---|---|
| A computer should be ____________ protected. | password |
| With _________ storage, you can retrieve your data anytime from anywhere with internet connections. | cloud |
| _____________ inspect data transmitted between a computer and external recipients to prevent unauthorized access to data. | firewalls |
| ____________ displays unwanted advertisements in a banner or pop-up. | Adware |
| _________ is something that does something bad to your computer, and often comes in the form of viruses, Trojans, or worms. | Malware |
| _________ are used by commercial web sites to customize web pages | cookies |
| A _____ is used to take over a remote computer to perform malicious work by a hacker. | bot |
| _____________ is software that is secretly installed on a computer, tracking and transmitting personal data without your knowledge and/or permission. | spyware |
| _______ is a high-level encryption for wireless devices. | WPA2 |
| __________ is the term that is used to identify the computer user is who they say they are. | authentication |
| Strong ___________ include upper, lower case characters, special symbols, numbers, and are not words that can be found in the dictionary. | password |
| ________ is your unique name to identify yourself to a computer system. | username |
| Some _________are built into the operating systems. | firewalls |
| _________ is a scam that appears to be an email with a genuine message or web site, but tries to get you to reveal sensitive, personal information. | phishing |
| A ____ is a type of malware that spreads on its own, without human intervention. | worm |
| ________ is used to collect bits of information, such as your surfing habits. | spyware |
| ______ can easily be spread through e-mail attachments. | virus |
| A slow internet connect can be the result of ___________. | piggybacking |
| Intellectual ________ is a legal term for the ownership of an intangible asset, such as an idea. | property |
| ____ is also known as an end-user license agreement. | EULA |
| _____ is the illegal copying and distribution of copyrighted software. | piracy |
| ____ is a technology used to fight software piracy and prevent unauthorized copying of digital content | DRM |
| Energy ______ devices draw power even when they are turned off or in standby mode. | vampire |
| It is ethical to download a presentation video from the _____________ and use it in a presentation. | public domain |
| IT code of conduct lists ___________ things a computer can do on a computer system | ethical |
| _________ is a group of programs, such as worms, virus, trojons and rootkits, that perform some "bad" service on your computer. | malware |
| Digital certificates are valid for _____ years. | two |
| To safeguard your personal information, it is recommended that you clear the ______ file when you are finished browsing the internet. | history |
| Files are ___________ when backups are loaded back onto the computer. | restored |
| A __________ DoS attack uses multiple unsuspecting computers to attack multiple computer networks. | distributed |
| _________ is often used by advertising firms to collect information concerning browsing habits. | spyware |
| Content ___________ is often used in business to limit employee's web access to certain sites. | filtering |
| Many sites require a user to enter a _____, which is a private combination of characters associated with a user name that allows access to certain computer resources | password |
| Approximately 25% of ________ connections are unsecured, leaving them susceptible to hackers. What was that percentage? | wireless |
| A ___________ is a group of compromised computers connected to a network that attacks other networks | botnet |
| The term _____ refers to the destructive event or prank the program is intended to deliver | payload |
| You must first ________ encrypted data to turn it into a readable form. | decrypt |
| Websites use a session _________ to keep track of items in a shopping cart. | cookie |
| ____________ is the software license for an individual user, and explains the terms of usage. | EULA |
| Bots are used to perform a ________ task. | bot |
| A _________ site uses encryption techniques to protect its data. | secure |
| ____________ is used to discover, collect, and analyze evidence found on computers and networks?. | digital forensics |
| A ________ license is used to allow multiple users access to software on a server simultaneously. | network |
| A ___ license is used to permits users to install the software on multiple computers, usually at a volume discount. | site |
| ___________ are used to record, save, an then execute a set of keystrokes and instructions repeatedly. | macros |
| __________ refers to the rights in which creators are entitled to recognition/compensation for their work. | intellectual property |
| A ____ backup copies all files in a computer. | full |
| ___________ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials? | copyright |
| A script kiddie has the same intent as a _____, but does not have the technical skills and knowledge that the second group has. | cracker |
| A certificate ___________ authenticates and verifies a person or company. | authority |
| A digital security _____ is any event or action that could cause a loss of or damage to computer hardware, software, data, | risk |
| A _________ is someone who demands payment in order to stop an attack on an organization’s technology infrastructure. | cyberextorntionist |
| A cookie is a small ____ file that a web server stores on a user’s computer. | text |
| A ____ provides the mobile user with a secure connection to the company network server? | vpn |
| Information ___________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. | privacy |
| ____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos. | IP; intellectual property |
| Biometric devices are the most ______ method of identification and notification | reliable |
| _______ describe a scam in which a website includes a button, image or link that contains a malicious program? | clickjacking |
| ___________ up refers to making a copy of the file. | backing |
| Software used by cybercriminals is referred to as _______. | crimeware |
| With a three-generation backup policy, the ______ is the oldest copy of the file. | grandparent |
| ________ backups are used when one is able to choose which folders and files to include in a backup. | selective |
| __________ are effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters but impossible for computers to recognize. | CAPTCHA |
| Product ________ uses an identification number that associates your new software purchase with the mobile device on which you installed the software | activation |