Morley Flashcards
- Computer crime is sometimes referred to as ____.
a. hacking
b. cybercrime
c. cyberstalking
d. spoofing
cybercrime
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
a. cybercrime protocols
b. codes of conduct
c. anithacking rules
d. school rules
codes of conduct
____ refers to the act of breaking into a computer or network.
a. Spamming
b. Phishing
c. Hacking
d. Spoofing
hacking
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.
a. India
b. China
c. Russia
d. the United States
the United States
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
a. spoofing
b. phishing
c. spamming
d. war driving
war driving
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
a. war driving
b. Wi-Fi piggybacking
c. Wi-Fi worming
d. denial of service
Wi-Fi piggybacking
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
a. Usernames
b. PINs
c. Passwords
d. Codes
Passwords
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
a. Touch object
b. Possessed object
c. Two-factor
d. Biometric
Possessed object
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.
a. botherders
b. botnets
c. passes
d. tokens
Tokens
____ identify users by a particular unique biological characteristic.
a. Possessed object access systems
b. Password access systems
c. Possessed knowledge access systems
d. Biometric access systems
Biometric access systems
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
a. Trojan horse
b. firewall
c. hub
d. bridge
firewall
____ uses a single secret key to both encrypt and decrypt the file or message.
a. Private key encryption
b. Asymmetric key encryption
c. Public key encryption
d. Synchronous key encryption
Private key encryption
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
a. CryptMail
b. Quietmail
c. Hushmail
d. PrivateMail
Hushmail
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
a. laptop private network
b. USB private network
c. tunnel private network
d. virtual private network
virtual private network
____ software can control which devices can be connected to an employee’s computer.
a. Data-leakage prevention
b. Device authentication
c. Professional firewall
d. Network quarantine
Device authentication
____ includes any acts of malicious destruction to a computer or computer resource.
a. Phishing attacks
b. Blocking attacks
c. Computer sabotage
d. Spoofing attacks
Computer sabotage
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
a. spider
b. server
c. client
d. bot
Bot
____ is a generic term that refers to any type of malicious software.
a. Spamware
b. Malware
c. Spyware
d. Badware
malware
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
a. phish
b. virus
c. bot
d. link
virus
Like a computer virus, a ____ is a malicious program designed to cause damage.
a. computer worm
b. scam
c. phish
d. computer bug
computer worm
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
a. Trojan horse
b. computer worm
c. computer insect
d. computer bug
Trojan horse
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
a. virus
b. software
c. worm
d. hacker
worm
One emerging type of Trojan horse is called a ____-Access Trojan.
a. Demote
b. Remote
c. Control
d. Hacker
remote
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
a. threat definitions
b. viruses
c. fraud tips
d. virus reports
threat definitions
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
a. e-cons
b. e-scams
c. dot frauds
d. dot cons
dot cons
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.
a. Data theft
b. Information theft
c. Identity theft
d. Database theft
Identity theft
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
a. Spams
b. Identity theft
c. Remote access
d. Software theft
Identity theft
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
a. typosquatting
b. spamming
c. DoS attacks
d. identity theft
typosquatting
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
a. Framing
b. Fishing
c. Pharming
d. Farming
pharming
The best protection against many dot cons is ____.
a. contacting your ISP
b. updating the operating system
c. installing an antivirus program
d. common sense
common sense
When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature.
a. private
b. public
c. organizational
d. token
private
Repeated threats or other harassment carried out online between adults is referred to as ____.
a. cyberstalking
b. computer sabotage
c. cyberterrorism
d. phishing
cyberstalking
- The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
a. Sarbanes-Oxley Act
b. USA Patriot Act
c. Identity Theft and Assumption Deterrence Act of 1998
d. No Electronic Theft (NET) Act
USA Patriot Act
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
a. Heath Insurance Portability and Accountability Act (HIPAA)
b. PROTECT Act
c. Homeland Security Act of 2002
d. National Information Infrastructure Protection Act
Homeland Security Act of 2002