Chapter 5 Checkpoint Flashcards
True or False: any illegal act involving the use of a computer or related devices generally is referred to as crimware
False
True or False: some malware contains elements of a virus, worm, and trojan horse
True
True or False: a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services
False
True or False: an audit trail records in a file both successful and unsuccessful access attempts
True
True or False: it is good practice to change your password frequently
True
True or False: a typical license agreement allows you to rent or lease the software
False
True or False: unencrypted, readable data is called ciphertext
False
True or False: private key encryption also is called asymmetric key encryption
True
True or False: VPN’s encrypt data to help ensure that the data is safe from being intercepted by unauthorized people
True
True or False: although wireless access provides many conveniences to users, it also poses additional security risks
True
True or False: it is impossible to detect if someone is accessing your wireless home network
False
True or False: before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remain private
True
A ____________ is someone who demands payment to stop an attack on an organization’s technology infrastructure.
cyberextortionist
________ is a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user.
spyware
An employee using an organization’s computer to send personal email messages might be an example of ___________ _______ ___ ____.
unauthorized access and use
A _________ is a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
passphrase
A(n) _________ encryption algorithm inserts characters between existing characters.
expansion
A(n) _________ _____ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.
encryption key
A(n) ________ _____ ________ backup method is the only real-time back up, providing very fast recovery of data.
continuos data protection
Online shopping websites generally use a ________ to keep track of items in a user’s shopping cart.
session cookie
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
digital security risk
program that performs a repetitive task on a network
bot
compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
zombie
an assault whose purpose is to disrupt compute access to an internet service such as the web or email
denial of service attack