quiz6 Flashcards
____ can tell more about a person than all other kinds of electronic surveillance.
Data mining
Twitter is a ____ site.
microblogging
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
social engineering
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
SSL
The biggest challenge posed by Big Data is ____.
developing software to analyze the massive amount of data
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
phishing
Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____.
spyware
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
satellite imagery
Which of the following is one realistic way to promote Internet security?
Select strong passwords and change them regularly.
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
encrytion
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what’s kept about them is the ____.
Privacy Act of 1974
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
ports
Of the following, ____ is considered the most invasive.
network behavioral targeting
A common form of authentication is a ____.
password
Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws.
updates
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
User
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
US-CERT
An email with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of a ____ scam.
phishing
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.
analyze large amounts of data
____ is a form of traffic shaping.
Throttling
A company called ____ provides digital certifications for web transactions.
VeriSign
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
Internet server
When using a public Wi-Fi network, when is it safe to send private information over the network?
never
An individual who illegally downloads copyright-protected software is referred to as a ____.
pirate
All of the following are examples of malware EXCEPT ____.
updates
Of the following, ____ contains the most information about citizens of the United States.
LexisNexis
An item such as a smart card is an example of the ____ form of authentication.
something you have
____ favor(s) an Internet that is open, with packets unexamined and unfiltered.
Network neutrality
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
network usage policy
A ____ may be used to filter data that may be undesirable.
firewall
A ____ allows hackers to gain access to important code or information in a software program.
security hole
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
SSL conection
Citizens of free and democratic nations expect, at the least, privacy ____.
within the home
The Total Information Awareness tracking information system was created by ____.
the U.S. federal government
MATRIX technology ____.
is still implemented by some states
____ is currently dampening the ability of government surveillance to grow.
Lack of funding and personnel