Morley Flashcards

1
Q
  1. Computer crime is sometimes referred to as ____.
    a. hacking
    b. cybercrime
    c. cyberstalking
    d. spoofing
A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

a. cybercrime protocols
b. codes of conduct
c. anithacking rules
d. school rules

A

codes of conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ refers to the act of breaking into a computer or network.

a. Spamming
b. Phishing
c. Hacking
d. Spoofing

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.

a. India
b. China
c. Russia
d. the United States

A

the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

a. spoofing
b. phishing
c. spamming
d. war driving

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

a. war driving
b. Wi-Fi piggybacking
c. Wi-Fi worming
d. denial of service

A

Wi-Fi piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

a. Usernames
b. PINs
c. Passwords
d. Codes

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

a. Touch object
b. Possessed object
c. Two-factor
d. Biometric

A

Possessed object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.

a. botherders
b. botnets
c. passes
d. tokens

A

Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ identify users by a particular unique biological characteristic.

a. Possessed object access systems
b. Password access systems
c. Possessed knowledge access systems
d. Biometric access systems

A

Biometric access systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

a. Trojan horse
b. firewall
c. hub
d. bridge

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ uses a single secret key to both encrypt and decrypt the file or message.

a. Private key encryption
b. Asymmetric key encryption
c. Public key encryption
d. Synchronous key encryption

A

Private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.

a. CryptMail
b. Quietmail
c. Hushmail
d. PrivateMail

A

Hushmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

a. laptop private network
b. USB private network
c. tunnel private network
d. virtual private network

A

virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ software can control which devices can be connected to an employee’s computer.

a. Data-leakage prevention
b. Device authentication
c. Professional firewall
d. Network quarantine

A

Device authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ includes any acts of malicious destruction to a computer or computer resource.

a. Phishing attacks
b. Blocking attacks
c. Computer sabotage
d. Spoofing attacks

A

Computer sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

a. spider
b. server
c. client
d. bot

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is a generic term that refers to any type of malicious software.

a. Spamware
b. Malware
c. Spyware
d. Badware

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

a. phish
b. virus
c. bot
d. link

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Like a computer virus, a ____ is a malicious program designed to cause damage.

a. computer worm
b. scam
c. phish
d. computer bug

A

computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A ____ is a malicious program that masquerades as something else—usually as some type of application program.

a. Trojan horse
b. computer worm
c. computer insect
d. computer bug

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

a. virus
b. software
c. worm
d. hacker

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

One emerging type of Trojan horse is called a ____-Access Trojan.

a. Demote
b. Remote
c. Control
d. Hacker

A

remote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

a. threat definitions
b. viruses
c. fraud tips
d. virus reports

A

threat definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

a. e-cons
b. e-scams
c. dot frauds
d. dot cons

A

dot cons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.

a. Data theft
b. Information theft
c. Identity theft
d. Database theft

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

a. Spams
b. Identity theft
c. Remote access
d. Software theft

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

a. typosquatting
b. spamming
c. DoS attacks
d. identity theft

A

typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

a. Framing
b. Fishing
c. Pharming
d. Farming

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The best protection against many dot cons is ____.

a. contacting your ISP
b. updating the operating system
c. installing an antivirus program
d. common sense

A

common sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature.

a. private
b. public
c. organizational
d. token

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Repeated threats or other harassment carried out online between adults is referred to as ____.

a. cyberstalking
b. computer sabotage
c. cyberterrorism
d. phishing

A

cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
    a. Sarbanes-Oxley Act
    b. USA Patriot Act
    c. Identity Theft and Assumption Deterrence Act of 1998
    d. No Electronic Theft (NET) Act
A

USA Patriot Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

a. Heath Insurance Portability and Accountability Act (HIPAA)
b. PROTECT Act
c. Homeland Security Act of 2002
d. National Information Infrastructure Protection Act

A

Homeland Security Act of 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Our networked society has raised a number of ____ concerns.

a. privacy
b. patent
c. hardware theft
d. software quality

A

privacy

36
Q

New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.

a. 50 feet
b. 1,000 feet
c. 100 feet
d. 2 miles

A

1000

37
Q

Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.

a. software piracy
b. interrupted power
c. spikes
d. system failure

A

system failure

38
Q

To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.

a. security slot
b. cable anchor
c. security opening
d. user lock

A

security slot

39
Q

____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

a. Surge suppressors
b. Password locks
c. Spike suppressors
d. Cable locks

A

Cable locks

40
Q

____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.

a. USB b. RFID
c. IDC d. FDE

A

FDE

41
Q

Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.

a. recycle
b. recovery
c. repair
d. running

A

recovery

42
Q

____ devices are designed to withstand much more physical abuse than conventional devices.

a. Secured
b. Ruggedized
c. Malleable
d. Flexible

A

Ruggedized

43
Q

Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

a. pads
b. sleeves
c. pillows
d. cushions

A

sleeves

44
Q

____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.

a. Malleable
b. Rugged
c. Semirugged
d. Flexible

A

Rugged

45
Q

Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

a. UPS
b. surge suppressor
c. voltage controller
d. voltage meter

A

UPS

46
Q

____ are small programs that take care of software-specific problems, or bugs, such as security holes.

a. Backups
b. Applets
c. Scripts
d. Patches

A

patches

47
Q

To supplement backup procedures, businesses and other organizations should have a(n) ____.

a. insurance plan
b. continuation rule
c. disaster recovery plan
d. survival guide

A

disaster recovery plan

48
Q

Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

a. mirror
b. hotspot
c. hot file
d. backup

A

backup

49
Q

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.

a. buddy site
b. alternate pad
c. hot site
d. white room

A

hot site

50
Q

To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

a. 7 to 10 years
b. 10 years
c. 10 to 12 years
d. 12 years

A

7 to 10 years

51
Q

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

a. information privacy
b. information security
c. information piracy
d. digital Counterfeiting

A

information privacy

52
Q

____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.

a. Government databases
b. Marketing databases
c. Educational databases
d. Research databases

A

Marketing databases

53
Q

A marketing activity that can be considered a privacy risk is ____.

a. security threads
b. watermarking
c. electronic profiling
d. microprinting

A

electronic profiling

54
Q

Collecting in-depth information about an individual is known as ____.

a. personal databasing
b. identity theft
c. information piracy
d. electronic profiling

A

electronic profiling

55
Q

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

a. piracy policy
b. security policy
c. identity policy
d. privacy policy

A

privacy policy

56
Q

When spam is sent via IM it is called ____.

a. spoof
b. phish
c. spim
d. junk

A

spim

57
Q

For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

a. junkie e-mail address
b. throw-away e-mail address
c. one-use e-mail address
d. second-hand e-mail address

A

throw-away e-mail address

58
Q

One common way to deal with spam that makes it to your computer is to use a(n) ____.

a. e-mail filter
b. spam e-mail address
c. encryption scheme
d. hot site

A

email filter

59
Q

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

a. signing piracy agreements b. opting out
c. contracting legal help
d. e-mailing them

A

opting out

60
Q

To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

a. filter
b. opt in
c. opt out
d. share accept

A

opt in

61
Q

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.

a. Surveillance software
b. Video software
c. Computer monitoring software
d. Audio software

A

Computer monitoring software

62
Q

____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

a. Computer monitoring
b. Computer surveillance
c. Multimedia surveillance
d. Video surveillance

A

Video surveillance

63
Q

____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

a. Computer monitoring
b. Computer surveillance
c. Multimedia surveillance
d. Video surveillance

A

Video surveillance

64
Q

____ refers to companies recording or observing the actions of employees while on the job.

a. Computer monitoring
b. Video surveillance
c. Employee monitoring
d. Identity theft

A

computer monitoring

65
Q

For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

a. proximity cards
b. presence technology
c. face recognition
d. video cards

A

proximity cards

66
Q

____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.

a. Presence technology
b. Computer monitoring
c. Digital surveillance
d. Detection technology

A

presence technology

67
Q

____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

a. Antivirus software
b. Antispyware software
c. Antispoof software
d. Antiphish software

A

Antispyware software

68
Q

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.

a. Sarbanes-Oxley Act
b. USA Patriot Act
c. CAN-SPAM act
d. Junk Fax Prevention Act

A

CAN-SPAM act

69
Q

One of the key enhancements in the newest Bluetooth specification known as _____________ is low energy, which enables small devices to run for years on a single button-sized battery.

a. Bluetooth LE
b. Bluetooth Smart
c. Bluetooth wirless USB
d. Bluetooth Gig

A

Bluetooth Smart

70
Q

____ mobile payments use RFID to facilitate communication between devices, including transferring payment information, receipts, boarding passes, and other information wirelessly between payment terminals and mobile phones.

a. Wireless Batch Communication (WBC)
b. RF Product Communication (RFPC)
c. Near Field Communication (NFC)
d. Electronic Product Coding (EPC)

A

Near Field Communication (NFC)

71
Q

Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.

a. circuit boards
b. silicon
c. aluminum
d. magnetic

A

silicon

72
Q

____ chips have a special coating that changes its physical state when heat is applied.

a. RAM
b. PAM
c. RPAM
d. PRAM

A

RAM

73
Q

A __________ usually projects the image from a mobile device to a display screen built into the glasses via a wireless connection.

a. wearable display
b. integrated projector
c. pico projector
d. 3D printer

A

wearable display

74
Q

____ displays are transparent; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen.

a. TOLED
b. TLED
c. TDOE
d. TLED

A

TOLED

75
Q

Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.

a. internal
b. external
c. diffuse
d. both a and b

A

external

76
Q

To record data, holographic storage systems split the light from a blue laser beam into two beams–a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.

a. reference
b. static
c. standard
d. starting

A

reference

77
Q

With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM), which translates the data’s 0s and 1s into a hologram.

a. starting
b. standard
c. spatial
d. static

A

spatial

78
Q

Today’s holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from 300 GB to ____ GB per cartridge.

a. 400
b. 500
c. 600
d. 700

A

500

79
Q

Most people agree that nanotechnology involves creating computer components, machines, and other structures that are less than ____ nanometers in size.

a. 10
b. 100
c. 1,000
d. 10,000

A

100

80
Q

The wall of a single-walled carbon nanotube is only one carbon atom thick and the tube diameter is approximately ____ times smaller than a human hair.

a. 10
b. 1,000
c. 10,000
d. 100,000

A

100,000

81
Q

One recent development in new technology is ____ that can remove contaminants from water sources.

a. magnetized particles b. microparticles
c. nanofilters
d. electroparticles

A

nanofilters

82
Q

A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.

a. optical
b. digital
c. hybrid
d. solar

A

optical

83
Q

While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.

a. electro-optics
b. electronic-opto
c. opto-electronic
d. optics-electro

A

opto-electronic

84
Q

One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ videoconferencing.

a. telepresence
b. television
c. telephoning
d. televirtual

A

telepresence

85
Q

Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.

a. microwave
b. electrical
c. magnetized
d. radio wave

A

electrical

86
Q

Developed in the late 1990s, Wi-Fi (for wireless fidelity) is a family of wireless networking standards that use the IEEE standard ____.

a. 802.1
b. 802.11
c. 801.2
d. 801.22

A

802.11