____ apps can allow you to lock your mobile device and SIM card remotely. Show
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
What is the term for a program that performs a repetitive task on a network?
How much do fingerprint readers typically cost?
What is an EULA intended to do?
Answer: license software for individual use Which of the following provides the mobile user with a secure connection to the company network server?
Which of the following best describes the term, cybercrime?
Answer: online or Internet-based illegal acts Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
The term firewall is ...
Answer: hardware and/or software that protects a network's resources from intrusion Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
Which of the following is an authorized person or company that issues and verifies digital certificates?
Answer: certificate authority Which of the following copies all of the files in a computer?
What occurs when someone steals personal or confidential information?
Which of the following statements is not true about biometric devices?
Answer: Biometric devices are an unreliable method of identification and notification. What happens during a DDoS attack?
Answer: A zombie army is used to attack computers or computer networks. Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
Which of the following categories are the rights to which creators are entitled for their work?
Answer: intellectual property The term CAPTCHA is _____________.
Answer: a series of distorted characters that a user is required to enter correctly to continue using a website. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
Websites use which of the following to keep track of items in a user’s shopping cart?
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
Answer: employee monitoring How long can digital certificates be valid?
With which of the following do users choose which folders and files to include in a backup?
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
Answer: They restore the files. Internet advertising firms often use which of the following to collect information about users web browsing habits?
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
Which encryption algorithm inserts characters between existing characters?
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
What is another name for public key encryption?
Answer: asymmetric key encryption Into which of the following kinds of ports do external fingerprint readers plug?
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Answer: Electronic Communications Privacy Act (ECPA) With a three-generation backup policy, the grandparent is which of the following?
Answer: oldest copy of the file Which of the following terms refers to making a copy of a file?
Which of the following is not a possessed object?
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Which of the following is not a security product developer?
What is the term for a website that uses encryption techniques to protect its data?
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
Answer: information privacy Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
Which of the following statements is not true about intellectual property rights?
Answer: The term fair use refers to the rights which creators are entitled for their work. What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Which of the following statements is not true about backing up?
Answer: With a selective backup, all of the files in the computer automatically are chosen to be copied. You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called:
The term, payload, as it pertains to computer crime, is defined as...
Answer: the destructive event or prank the program is intended to deliver The term back door, as it refers to computer crime, is...
Answer: a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
Which of the following does your college use to verify your identity?
Answer: digital forensics system Which of the following statements is not true about Internet and network attacks?
Answer: Information kept on an organization’s premises has a higher security risk than information transmitted over networks. What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
Answer: voice verification system An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
Which of the following is the least likely motive for a DDoS?
Which of the following is the process of restricting access to certain material on the web?
Social engineering, as it pertains to computers, is...
Answer: gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users Many businesses use which of the following to limit employees’ web access?
What is the term for someone who accesses a computer or network illegally?A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
Is someone who access a computer or network illegally and has the intent of destroying the data stealing the information or other malicious action?A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills.
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?IT 100 Final. What is a collection of compromised computers called?Attackers often use collections of compromised computers for malicious purposes. We call this a botnet because the compromised computers act like bots to carry out instructions.
|