Computer Security, Safety, Ethics and Privacy Flashcards

1
Q

Action that causes loss of or damage to computer system.

A

Computer Security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a potentially damaging computer
program. Can spread and damage
files.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

copies itself repeatedly, using up resources
and possibly shutting down computer or
network.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hides within or looks like a legitimate
program until triggered. Does not
replicate itself on other computers.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

can be a small program, or script, that
automates common tasks. These scripts are usually run within other programs.

A

Macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identifies and removes computer viruses. Most also protect against worms and
Trojan horses.

A

Antivirus Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specific pattern of
virus code

A

Virus Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Also called virus definition

A

Virus Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Antivirus programs
look for virus
signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does an
antivirus program
inoculate a
program file?

A
  1. Records information about programs such as file size and creation date.
  2. Attempts to remove any detected virus
  3. Uses information to detect if virus tampers with file.
  4. Quarantines infected files that it cannot remove.
  5. Keeps file in separate area of hard disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is an assault which disrupts computer access to an Internet service such as the Web or e mail

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a program or set of instructions
in a program that allow users to bypass
security controls when accessing a computer
resource

A

Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Makes a network or Internet
transmission appear legitimate

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source. It trick their victims into interacting with a phony Web site.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security system consisting of hardware and/or software that prevents unauthorized intrusion.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Program that protects personal computer and its data from unauthorized intrusions and Monitors transmissions to and from computer.

A

Personal Firewall Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Informs you of attempted
intrusion

A

Personal Firewall Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

defines who can access computer & what
actions they can take

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

records
access attempts

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior

A

Intrusion Detection Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are other ways to
protect your personal
computer?

A

Disable file and
printer sharing on
Internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Unique combination
of characters that
identifies user

A

user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is private
combination of
characters
associated
with the user name
that allows access
to computer
resources

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Item that you must carry
to gain access to
computer or facility
Often used with
numeric password
called personal
identification
number (PIN)

A

Possessed Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Authenticates person’s identity using personal characteristic (Fingerprint, hand
geometry, voice, signature, and iris)

A

Biometric Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is act of stealing
computer equipment

A

Hardware Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is act of defacing
or destroying computer equipment

A

Hardware Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Act of stealing or
illegally copying
software or
intentionally
erasing
programs

A

Software Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is illegal
duplication
of copyrighted
software

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Right to use software

A

license agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

allows user to
install software on one
computer, make backup
copy, and sell software
after removing from
computer

A

Single user license
agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

allows user to input product identification number online or by phone and receive unique installation identification number

A

Product Activation

34
Q

promotes better understanding of software piracy problems

A

Business Software Alliance (BSA)

35
Q

What are some other safeguards against software theft?

A
  1. Product Activation
  2. Business Software Alliance (BSA)
36
Q

Safeguards against information theft
Process of converting plaintext (readable data) into ciphertext
(unreadable characters)

A

Encryption

37
Q

often uses more than one method
To read the data, the recipient must decrypt , or decipher, the data

A

Encryption Key

38
Q

How do Web browsers provide secure data
transmission?

A
  1. Secure Site
  2. Digital Certificate
  3. Many Web browsers
    use encryption
39
Q

is Web site that uses
encryption to secure

A

Secure Site

40
Q

is notice that guarantees Web site is
legitimate

A

Digital Certificate

41
Q

Authorized person or
company that issues
and verifies digital
certificates

A

Certificate Authority (CA)

42
Q

Provides
encryption of all
data that passes
between client
and Internet

A

Secure Sockets Layer (SSL)

43
Q

Web addresses
beginning with
“https” indicate

A

secure connections

44
Q

Caused by aging hardware,
natural disasters, or electrical
power disturbances

A

system failure

45
Q

Can cause loss of hardware,
software, or data. Prolonged malfunction of a computer

A

system failure

46
Q

Protects computer and
equipment from electrical power
disturbances

A

Surge Protector

47
Q

is surge protector that
provides power during power
loss

A

Uninterruptible power supply
(UPS)

48
Q

Duplicate of file, program, or disk

A

Backup

49
Q

Three Types of Backup

A
  1. Full backup
  2. Selective backup
  3. Three Generation Backup
50
Q

In case of system failure or corrupted files,
restore files by copying to original location

A
51
Q

How can I ensure my wireless communication is secure?

A

Secure your wireless access point (WAP) should not broadcast your network name
Enable Wired Equivalent Privacy or Wi Fi Protected Access (WiFi)

52
Q

WiFi
networks around
Luneta and Manila City
Hall, mapped using

A

wardriving

53
Q

Moral guidelines that govern use of computers and information
systems

A

Computer Ethics

54
Q

rights to
which creators are
entitled for their
work

A

Intellectual property rights

55
Q

what are the list of computer ethics

A
  1. Software theft
  2. Information accuracy
  3. Codes of conduct
  4. Information privacy
  5. Intellectual property
    rights
  6. Unauthorized use of
    computers and
    networks
56
Q

Written guideline that
helps determine
whether computer
action is ethical

A

IT code of conduct

57
Q

Right of individuals and companies to
deny or restrict collection and use of
information about them

A

Information Privacy

58
Q

is using
computers to observe
employee computer use

A

Employee Monitoring

59
Q

Data collected when
you fill out form on
Web

A

Electronic Profile

60
Q

Small file on
your
computer that
contains data
about you

A

cookie

61
Q

Scam in which a perpetrator
sends an official looking
e mail that attempts
to obtain your personal and
financial information

A

phishing

62
Q

is program
placed on computer
without user’s
knowledge

A

Spyware

63
Q

is a program
that displays online
advertisements

A

Adware

64
Q

Service that
blocks e mail
messages from
designated
sources
Collects spam in
central location
that you can
view any time

A

Email Filtering

65
Q

Attempts to
remove spam
Sometimes
removes valid
e mail messages

A

Anti spam program

66
Q

Process of restricting
access to certain material
Internet Content Rating
Association (ICRA)
provides rating system of
Web content

A

content filtering

67
Q

restricts access to
specified sites

A

Web filtering software

68
Q

Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.

A

False

69
Q

Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.

A

True

70
Q

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

A

False

71
Q

A brownout is a complete power failure.

A

False

72
Q

A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.

A

True

73
Q

A surge protector absorbs small overvoltages — generally without damage to the computer or equipment.

A

True

74
Q

A(n) ________ is someone who uses e-mail as a vehicle for extortion.

A

cyberextortionist

75
Q

A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.

A
76
Q

It is illegal for employers to use software programs that monitor employees.

A

False

77
Q

Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.

A

False

78
Q

To prevent repetitive strain injury, take all of the following precautions except ____.

A

use the heel of the hand as a pivot point while typing or using the mouse

79
Q

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

A

RSI

80
Q

A spyware program communicates information it collects to some inside source while a user is offline.

A

false

81
Q

Web ____ software is a program that restricts access to specified Web sites.

A

filtering

82
Q

Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.

A

True