click below
click below
Normal Size Small Size show me how
ITC-FA8
| Question | Answer |
|---|---|
| Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. | TRUE |
| Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. | TRUE |
| Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. | TRUE |
| Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion. | TRUE |
| Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. | TRUE |
| Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. | War Driving |
| In the case of system failure or the discovery of corrupted files, users ________ the files by copying the backed up files to their original location on a computer. | Restore |
| To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret. | FALSE |
| Biometric objects often are used in combination with personal identification numbers. | FALSE |
| A(n) ________ is someone who uses e-mail as a vehicle for extortion. | Hacker |
| Web ____ software is a program that restricts access to specified Web sites. | Filtering |
| Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. | FALSE |
| Assume that because information is on the Web, it is accurate. | FALSE |
| For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. | FALSE |
| To remove spyware, users need to obtain a special program that can detect and delete it. | TRUE |
| A spyware program communicates information it collects to some inside source while a user is offline. | FALSE |
| Many businesses use spyware to limit employees’ Web access. | FALSE |
| Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. | CVS |
| Computer addiction is an untreatable illness. | FALSE |
| Content ____ is the process of restricting access to certain material on the Web. | FILTERING |
| ____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. | Spyware |
| A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. | Script Kiddie |
| Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. | Malware |
| Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. | FALSE |
| A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. | Cyberterrorist |
| Any illegal act involving a computer generally is referred to as a computer security risk. | FALSE |
| A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. | Security |
| To prevent repetitive strain injury, take all of the following precautions except ____. | use the heel of the hand as a pivot point while typing or using the mouse |
| A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. | RSI |
| Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. | FALSE |
| Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. | Monitoring |
| The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. | Electronic Communications Privacy Act (ECPA) |
| A(n) ____ program secretly collects information about a user. | Spyware |
| Under voltages can cause equipment damage, but generally do not cause data loss. | FALSE |
| Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. | TRUE |
| A system ________ is the prolonged malfunction of a computer. | Failure |
| It is illegal for employers to use software programs that monitor employees. | FALSE |
| Many businesses use ____ to limit employees’ Web access. | Content Filtering |
| A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. | TRUE |
| The higher a surge protector’s Joule rating, the poorer the protection. | FALSE |
| A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. | FALSE |
| A(n) ________ occurs when the electrical supply drops. | Under Voltage/ Voltage Drop |
| A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. | Overvoltage |
| To ________ a file means to make a copy of it. | Back up |
| ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | Noise |
| Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. | TRUE |
| Perpetrators of back doors trick their victims into interacting with phony Web sites. | FALSE |
| A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. | FALSE |
| A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. | FALSE |
| A cyber extortionist uses the Internet or network to destroy or damage computers for political reasons. | FALSE (Cyberterrorist) |
| A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. | UPS |
| An online UPS switches to battery power when a problem occurs in the power line. | FALSE |
| A surge protector absorbs small over voltages — generally without damage to the computer or equipment. | TRUE |
| A brownout is a complete power failure. | FALSE |