FQ3 Flashcards

1
Q

What fraudulent practice of sending text messages purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords or credit card numbers?

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are digital security tools that bridge the gap between users and the Internet, using filtering rules in line with an organization’s IT policies?

A

Proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are set of characters that the originator of the data uses to convert the plaintext into a cipher or code, especially to prevent unauthorized access?

A

Encryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What outlines the activities for which the computer and network may and may not be used?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

A

Back Doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What group of compromised computers or mobile devices connected to a network, such as the Internet, used to attack other networks, usually for nefarious purposes?

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security measure defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it?

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of the group by Bashar al-Assad targeted opposition groups akin to a political protests by deploying or executing a DDOS attacks.

A

Syrian Electronic Army

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This kind of backup is challenging to manage individual file backups. Least manageable of all the backup methods.

A

Selective Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Electronic evidence is a component of almost all criminal activities and this support is crucial for law enforcement investigations. What science focuses on identifying, acquiring, processing, analyzing, and reporting on data electronically?

A

Digital Forensic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is also called symmetric key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data?

A

Private Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT an example of a biometric device?

A

voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What technique do intruders use to make their network or Internet transmission appear legitimate to a victim’s computer or network?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What program performs a repetitive task on a network which is used to send spam via email, spread viruses, and other malware?

A

bot

17
Q

Zeus is a malware which uses keystroke logging to compromise victim credentials when the user visits a banking website. What type of malware is Zeus?

A

Trojan Horse

18
Q

What device authenticates a person’s identity by translating a person’s characteristic into a digital code that is compared with a digital code stored in a computer or mobile device?

A

Biometric Device

19
Q

What restricts access to a computer or mobile device until a user performs a specific action, in this case the system requires a user to swipe the screen?

A

Lock Screen

20
Q

What is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to specific computer resources?

A

passphrase

21
Q

It is also called user ID, login name, or sign-in name?

A

User name

22
Q

What is defacing or destroying a digital equipment?

A

Hardware Vandalism

23
Q

What program hides in a computer or mobile device and allows someone from a remote location to control the computer or device fully?

A

Rootkit

24
Q

This is commonly used in virus hoaxes, spam, smishing (the fraudulent practice of sending text messages purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords or credit card numbers)), and phishing scams.

A

Email Spoofing

25
Q

This tool detects, evaluates, and manages any weak spots in your organization’s system.

A

Vulnerability Scanner

26
Q

It is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email?

A

DoS Attack

27
Q

What is stealing someone personal or confidential information to make fraudulent purchases or gain unauthorized access to a computer?

A

Information Theft

28
Q

What is used to detect and protects computer and its data from unauthorized intrusions by monitoring all transmissions to and from the computer?

A

Personal Firewall

29
Q

This system recognizes the shape of handwritten and measures there pressure exerted, and the motion used to write.

A

Signature Verification System

30
Q

The malware known as the Love Bug, the extremely harmful ILOVEYOU malware was able to spread fast in 2000, because of its abilities to access the email addresses found found in the user’s Outlook contact list and send itself across the worldwide web while overwriting a victim’s files. What type of malware is being referred in the example?

A

Worm

31
Q

What is an encrypted code that a person, website, or organization attaches to an electronic message to verify the message sender’s identity?

A

digital signature

32
Q

What kind of backup requires an Internet connection, otherwise files are marked for backup when the computer goes back online.

A

Cloud Backup

33
Q

It is a scam in which a perpetrator sends an official looking email message that attempts to obtain personal and/or financial information.

A

Phishing

34
Q

What program displays an online advertisement in a banner, pop-up window on webpages, email messages, or other Internet services?

A

Adware

35
Q

What security measure defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it?

A

Access Controls

36
Q

What two separate methods are used by a computer or mobile device, one after the next, to verify the identity of a user?

A

Two-factor verification

37
Q

What is a license agreement that permits users to install the software on a multiple computers - usually at a volume discount?

A

site license

38
Q

Which among the following devices measure’s the hand to verify user’s identities?

A

Hand Geometry System