quiz6 Flashcards

1
Q

____ can tell more about a person than all other kinds of electronic surveillance.

A

Data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Twitter is a ____ site.

A

microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The biggest challenge posed by Big Data is ____.

A

developing software to analyze the massive amount of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.

A

satellite imagery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is one realistic way to promote Internet security?

A

Select strong passwords and change them regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You can protect yourself from identity theft by using ____ when transmitting information over network connections.

A

encrytion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what’s kept about them is the ____.

A

Privacy Act of 1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.

A

ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Of the following, ____ is considered the most invasive.

A

network behavioral targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A common form of authentication is a ____.

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws.

A

updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ permissions provide registered users with access to the files they need, while restricting access to private resources.

A

User

17
Q

The ____ was established to secure and monitor security risks to U.S. networks and the Internet.

A

US-CERT

18
Q

An email with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of a ____ scam.

A

phishing

19
Q

A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.

A

analyze large amounts of data

20
Q

____ is a form of traffic shaping.

A

Throttling

21
Q

A company called ____ provides digital certifications for web transactions.

A

VeriSign

22
Q

In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.

A

Internet server

23
Q

When using a public Wi-Fi network, when is it safe to send private information over the network?

A

never

24
Q

An individual who illegally downloads copyright-protected software is referred to as a ____.

A

pirate

25
Q

All of the following are examples of malware EXCEPT ____.

A

updates

26
Q

Of the following, ____ contains the most information about citizens of the United States.

A

LexisNexis

27
Q

An item such as a smart card is an example of the ____ form of authentication.

A

something you have

28
Q

____ favor(s) an Internet that is open, with packets unexamined and unfiltered.

A

Network neutrality

29
Q

When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.

A

network usage policy

30
Q

A ____ may be used to filter data that may be undesirable.

A

firewall

31
Q

A ____ allows hackers to gain access to important code or information in a software program.

A

security hole

32
Q

The https:// protocol in a URL indicates the use of a(n) ____ by the website.

A

SSL conection

33
Q

Citizens of free and democratic nations expect, at the least, privacy ____.

A

within the home

34
Q

The Total Information Awareness tracking information system was created by ____.

A

the U.S. federal government

35
Q

MATRIX technology ____.

A

is still implemented by some states

36
Q

____ is currently dampening the ability of government surveillance to grow.

A

Lack of funding and personnel