Chapter 5 Checkpoint Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

True or False: any illegal act involving the use of a computer or related devices generally is referred to as crimware

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: some malware contains elements of a virus, worm, and trojan horse

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: an audit trail records in a file both successful and unsuccessful access attempts

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: it is good practice to change your password frequently

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: a typical license agreement allows you to rent or lease the software

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: unencrypted, readable data is called ciphertext

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: private key encryption also is called asymmetric key encryption

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: VPN’s encrypt data to help ensure that the data is safe from being intercepted by unauthorized people

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: although wireless access provides many conveniences to users, it also poses additional security risks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: it is impossible to detect if someone is accessing your wireless home network

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remain private

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____________ is someone who demands payment to stop an attack on an organization’s technology infrastructure.

A

cyberextortionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An employee using an organization’s computer to send personal email messages might be an example of ___________ _______ ___ ____.

A

unauthorized access and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _________ is a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

A

passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) _________ encryption algorithm inserts characters between existing characters.

A

expansion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A(n) _________ _____ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.

A

encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A(n) ________ _____ ________ backup method is the only real-time back up, providing very fast recovery of data.

A

continuos data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Online shopping websites generally use a ________ to keep track of items in a user’s shopping cart.

A

session cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability

A

digital security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

program that performs a repetitive task on a network

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider

A

zombie

24
Q

an assault whose purpose is to disrupt compute access to an internet service such as the web or email

A

denial of service attack

25
Q

technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

A

spoofing

26
Q

a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

A

back door

27
Q

security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accesses it

A

access control

28
Q

the discovery, collection, and analysis of evidence found on computers and networks

A

cyberforensics

29
Q

notice that guarantees a user or website is legitimate

A

digital certificate

30
Q

strategy designed to prevent illegal distribution of movies, music, and other digital content

A

digital rights management

31
Q

What is cyberwarfare?

A

A cybercrime attack whose goal ranges from disabling a government’s computer network to crippling a country

32
Q

Differentiate among the various categories of cybercriminals.

A

1) Hacker
2) Cracker
3) Script Kiddie
4) Corporate Spy
5) Unethical Employee
6) Cyberextortionist
7) Cyberterrorist

33
Q

Differentiate among denial of service attacks, back doors, and spoofing.

A

Denial of service attacks- an assault whose purpose is to disrupt computer access to an internet service such as the web or email

Back doors- a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

Spoofing- a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.

34
Q

What are methods to protect computers, mobile devices, and networks from attacks?

A

(1) Use antivirus software
(2) Be suspicious of unsolicited email attachments
(3) Scan removable media for malware before using it
(4) Implement firewall solutions
(5) Back up regularly

35
Q

How does a biometric device work?

A

A biometric device authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.

36
Q

Explain how a biometric payment is made.

A

A biometric payment, is where the customer’s fingerprint is read by a fingerprint reader that is linked to a payment method such as a checking account or credit card.

37
Q

List five backup methods.

A

1) Full backup
2) Differential backup
3) Incremental backup
4) Selective backup
5) Continuous data protection (CDP)

38
Q

What are the four components contained in a disaster recovery plan?

A

(1) Emergency Plan
(2) Backup Plan
(3) Recovery Plan
(4) Test Plan

39
Q

What is private browsing?

A

Private Browsing, does not keep track of the websites you are visiting.

40
Q

List ways you can secure your browser.

A

(1) Clear your browsing history often
(2) Enable private browsing
(3) Turn off location sharing
(4) Never store passwords
(5) Clear cookies regularly
(6) Avoid phishing websites

41
Q

Which backup method is this:

longest backup time

A

Full backup

42
Q

Which backup method is this:

copies only the files that have changed since the last full backup

A

Differential backup

43
Q

Which backup method is this:

fast backup method; requires minimal storage space to back up

A

Differential backup

44
Q

Which backup method is this:

recovery is time-consuming because the last full backup plus the differential backup are needed

A

Differential backup

45
Q

Which backup method is this:

copies only the files that have changed since the last full or incremental backup

A

Incremental backup

46
Q

Which backup method is this:

fastest backup method

A

Incremental backup

47
Q

Which backup method is this:

requires minimal storage space to back up, only most recent changes saved

A

Incremental backup

48
Q

Which backup method is this:
recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed

A

Incremental backup

49
Q

Which backup method is this:

users choose which folders and files to include in a backup

A

Selective backup

50
Q

Which backup method is this:

fast backup method, provides great flexibility

A

Selective backup

51
Q

Which backup method is this:

difficult to manage individual file backups

A

Selective backup

52
Q

Which backup method is this:

least manageable of all the backup methods

A

Selective backup

53
Q

Which backup method is this:

all data is backed up whenever a change is made

A

Continuous data protection (CDP)

54
Q

Which backup method is this:

the only real-time backup, very fast recovery of data

A

Continuous data protection (CDP)

55
Q

Which backup method is this:

very expensive and requires a great amount of storage

A

Continuous data protection (CDP)