Filters
Question type

Study Flashcards

Which of the following is NOT a part of a typical single-user license agreement?


A) You can make one copy of the software as a backup.
B) You can rent or lease the software.
C) You cannot install the software on a network.
D) You cannot export the software.

Correct Answer

verifed

verified

B

Software used to fight cybercriminals is called crimeware.

Correct Answer

verifed

verified

List methods to protect computers, mobile devices, and networks from attacks.

Correct Answer

verifed

verified

• Use antivirus software.
• B...

View Answer

Viruses, worms, and trojan horses replicate themselves to other computers or devices.

Correct Answer

verifed

verified

Which of the following is not recommended to protect against hardware failure?


A) surge protector
B) UPS
C) cables and locks
D) duplicate components

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.


A) always stay connected to the Internet
B) use a firewall
C) be cautious when clicking links in email
D) never click OK in a pop-up spyware window

Correct Answer

verifed

verified

Badges, cards, smart cards, and keys are examples of _____ objects.


A) wearable
B) carried
C) possessed
D) pocket

Correct Answer

verifed

verified

C

Intentionally erasing software is not an example of software theft.

Correct Answer

verifed

verified

An encryption ______ is a set of steps that converts readable text into unreadable text.


A) series
B) algorithm
C) method
D) key

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?


A) Avoid games requiring passwords to be saved to an online account on a smartphone.
B) Look for games that use ActiveX or JavaScript, as these are always safe.
C) Check the developer of any software or apps to be certain it is legitimate.
D) Use a firewall when using multiplayer online games.

Correct Answer

verifed

verified

You should disable GPS tracking on your mobile device unless you need to use it.

Correct Answer

verifed

verified

Passcode is another term for a(n) ______.


A) user name
B) encryption algorithm
C) passphrase
D) PIN

Correct Answer

verifed

verified

A digital ______ is a notice that guarantees a user or website is legitimate.

Correct Answer

verifed

verified

Another term for botnet is ______ army.


A) ghost
B) vampire
C) zombie
D) spy

Correct Answer

verifed

verified

What does a keygen do?


A) Generates a list of user names and passwords for network administrators.
B) Creates CAPTCHA images.
C) Analyzes typing patterns to authenticate a user.
D) Creates software registration numbers.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
An authorized person or company that issues and verifies digital certificates
A notice that guarantees a user or a website is legitimate
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
An assault whose purpose is to disrupt computer access to an Internet service
In the encryption process, the unencrypted, readable data
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program
Any event or action that could cause a loss of or damage to computer or mobile device hardware
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Hacker who usually does not have advanced computer and technical skills
Protects a network's resources from intrusion
A program that performs a repetitive task on a network
In the encryption process, the encrypted (scrambled) data
Responses
digital certificate
bot
plaintext
CA
clickjacking
firewall
botnet
AUP
script kiddie
DoS attack
digital security risk
zombie
digital signature
ciphertext
piracy

Correct Answer

The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
An authorized person or company that issues and verifies digital certificates
A notice that guarantees a user or a website is legitimate
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
An assault whose purpose is to disrupt computer access to an Internet service
In the encryption process, the unencrypted, readable data
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program
Any event or action that could cause a loss of or damage to computer or mobile device hardware
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Hacker who usually does not have advanced computer and technical skills
Protects a network's resources from intrusion
A program that performs a repetitive task on a network
In the encryption process, the encrypted (scrambled) data

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

Correct Answer

verifed

verified

A password ______ is a service that stores all of your account information securely.


A) vault
B) binder
C) manager
D) collection

Correct Answer

verifed

verified

Common digital security risks include information theft and system failure.

Correct Answer

verifed

verified

Email spoofing rarely is used in virus hoaxes and spam.

Correct Answer

verifed

verified

False

Showing 1 - 20 of 86

Related Exams

Show Answer