Chapter 5 Checkpoint Flashcards
True or False: any illegal act involving the use of a computer or related devices generally is referred to as crimware
False
True or False: some malware contains elements of a virus, worm, and trojan horse
True
True or False: a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services
False
True or False: an audit trail records in a file both successful and unsuccessful access attempts
True
True or False: it is good practice to change your password frequently
True
True or False: a typical license agreement allows you to rent or lease the software
False
True or False: unencrypted, readable data is called ciphertext
False
True or False: private key encryption also is called asymmetric key encryption
True
True or False: VPN’s encrypt data to help ensure that the data is safe from being intercepted by unauthorized people
True
True or False: although wireless access provides many conveniences to users, it also poses additional security risks
True
True or False: it is impossible to detect if someone is accessing your wireless home network
False
True or False: before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remain private
True
A ____________ is someone who demands payment to stop an attack on an organization’s technology infrastructure.
cyberextortionist
________ is a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user.
spyware
An employee using an organization’s computer to send personal email messages might be an example of ___________ _______ ___ ____.
unauthorized access and use
A _________ is a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
passphrase
A(n) _________ encryption algorithm inserts characters between existing characters.
expansion
A(n) _________ _____ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.
encryption key
A(n) ________ _____ ________ backup method is the only real-time back up, providing very fast recovery of data.
continuos data protection
Online shopping websites generally use a ________ to keep track of items in a user’s shopping cart.
session cookie
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
digital security risk
program that performs a repetitive task on a network
bot