Filters
Question type

Study Flashcards

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?


A) re-securing
B) decryption
C) assessment
D) digitization

Correct Answer

verifed

verified

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Correct Answer

verifed

verified

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?


A) war driving
B) spitting
C) clickjacking
D) spimming

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?


A) Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
B) Clear your history file when you are finished browsing.
C) Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
D) Use shopping club and buying cards when shopping to remain anonymous.

Correct Answer

verifed

verified

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?


A) CAN-SPAM Act
B) Computer Abuse Amendments Act
C) COPPA
D) Electronic Communication Privacy Act

Correct Answer

verifed

verified

Into which of the following kinds of ports do external fingerprint readers plug?


A) parallel
B) MIDI
C) USB
D) serial

Correct Answer

verifed

verified

HIPAA protects individuals against the wrongful disclosure of their health information.

Correct Answer

verifed

verified

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?


A) Personal characteristics are unique and cannot be forgotten or misplaced.
B) Biometric devices are an unreliable method of identification and notification.
C) Examples include fingerprint readers and hand geometry systems.
D) Biometric devices translate a personal characteristic into a digital code.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
In the encryption process, the unencrypted, readable data.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
A program that restricts access to specified websites.
A common infringement of copyright.
A group of compromised computers.
An assault whose purpose is to disrupt computer access to an Internet service
An authorized person or company that issues and verifies digital certificates.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
A program that performs a repetitive task on a network.
Outlines the activities for which a computer or network may and may not be used.
A scam in which a button or link on a website contains a malicious program.
Protects any tangible form of expression.
Protects a network's resources from intrusion.
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
A notice that guarantees a user or a website is legitimate.
Biometric device used in high security areas.
Usually does not have advanced computer and technical skills.
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses
digital certificate
DoS attack
piracy
zombie
CA
clickjacking
AUP
firewall
plaintext
iris recognition system
digital security risk
digital signature
copyright
Digital Millennium Copyright Act (DCMA)
ciphertext
script kiddie
bot
botnet
web filtering software
password

Correct Answer

Any event or action that could cause a loss of or damage to computer or mobile device hardware.
In the encryption process, the unencrypted, readable data.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
A program that restricts access to specified websites.
A common infringement of copyright.
A group of compromised computers.
An assault whose purpose is to disrupt computer access to an Internet service
An authorized person or company that issues and verifies digital certificates.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
A program that performs a repetitive task on a network.
Outlines the activities for which a computer or network may and may not be used.
A scam in which a button or link on a website contains a malicious program.
Protects any tangible form of expression.
Protects a network's resources from intrusion.
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
A notice that guarantees a user or a website is legitimate.
Biometric device used in high security areas.
Usually does not have advanced computer and technical skills.
Makes it illegal to circumvent antipiracy schemes in commercial software.

COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


A) spoofing
B) phishing
C) veiling
D) costuming

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?


A) malware
B) cybersoft
C) evilapp
D) viralware

Correct Answer

verifed

verified

Which of the following is not a possessed object?


A) PIN
B) badge
C) smart card
D) key

Correct Answer

verifed

verified

Internet advertising firms often use which of the following to collect information about users web browsing habits?


A) comware
B) postware
C) spyware
D) billware

Correct Answer

verifed

verified

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?


A) software deployment
B) software decryption
C) app installation
D) product activation

Correct Answer

verifed

verified

What is another name for public key encryption?


A) controlled key encryption
B) virtual key encryption
C) asymmetric key encryption
D) secure key encryption

Correct Answer

verifed

verified

Describe botnets and denial of service attacks.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter. Which algorithm did you use?


A) substitution
B) transposition
C) expansion
D) compaction

Correct Answer

verifed

verified

Showing 61 - 80 of 181

Related Exams

Show Answer