Chapter 5 Checkpoint Flashcards

1
Q

True or False: any illegal act involving the use of a computer or related devices generally is referred to as crimware

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: some malware contains elements of a virus, worm, and trojan horse

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: an audit trail records in a file both successful and unsuccessful access attempts

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: it is good practice to change your password frequently

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: a typical license agreement allows you to rent or lease the software

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: unencrypted, readable data is called ciphertext

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: private key encryption also is called asymmetric key encryption

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: VPN’s encrypt data to help ensure that the data is safe from being intercepted by unauthorized people

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: although wireless access provides many conveniences to users, it also poses additional security risks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: it is impossible to detect if someone is accessing your wireless home network

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remain private

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____________ is someone who demands payment to stop an attack on an organization’s technology infrastructure.

A

cyberextortionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

________ is a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An employee using an organization’s computer to send personal email messages might be an example of ___________ _______ ___ ____.

A

unauthorized access and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _________ is a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

A

passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) _________ encryption algorithm inserts characters between existing characters.

A

expansion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A(n) _________ _____ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.

A

encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A(n) ________ _____ ________ backup method is the only real-time back up, providing very fast recovery of data.

A

continuos data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Online shopping websites generally use a ________ to keep track of items in a user’s shopping cart.

A

session cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability

A

digital security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

program that performs a repetitive task on a network

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider

24
Q

an assault whose purpose is to disrupt compute access to an internet service such as the web or email

A

denial of service attack

25
technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
spoofing
26
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
back door
27
security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accesses it
access control
28
the discovery, collection, and analysis of evidence found on computers and networks
cyberforensics
29
notice that guarantees a user or website is legitimate
digital certificate
30
strategy designed to prevent illegal distribution of movies, music, and other digital content
digital rights management
31
What is cyberwarfare?
A cybercrime attack whose goal ranges from disabling a government's computer network to crippling a country
32
Differentiate among the various categories of cybercriminals.
1) Hacker 2) Cracker 3) Script Kiddie 4) Corporate Spy 5) Unethical Employee 6) Cyberextortionist 7) Cyberterrorist
33
Differentiate among denial of service attacks, back doors, and spoofing.
Denial of service attacks- an assault whose purpose is to disrupt computer access to an internet service such as the web or email Back doors- a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network Spoofing- a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
34
What are methods to protect computers, mobile devices, and networks from attacks?
(1) Use antivirus software (2) Be suspicious of unsolicited email attachments (3) Scan removable media for malware before using it (4) Implement firewall solutions (5) Back up regularly
35
How does a biometric device work?
A biometric device authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
36
Explain how a biometric payment is made.
A biometric payment, is where the customer's fingerprint is read by a fingerprint reader that is linked to a payment method such as a checking account or credit card.
37
List five backup methods.
1) Full backup 2) Differential backup 3) Incremental backup 4) Selective backup 5) Continuous data protection (CDP)
38
What are the four components contained in a disaster recovery plan?
(1) Emergency Plan (2) Backup Plan (3) Recovery Plan (4) Test Plan
39
What is private browsing?
Private Browsing, does not keep track of the websites you are visiting.
40
List ways you can secure your browser.
(1) Clear your browsing history often (2) Enable private browsing (3) Turn off location sharing (4) Never store passwords (5) Clear cookies regularly (6) Avoid phishing websites
41
Which backup method is this: | longest backup time
Full backup
42
Which backup method is this: | copies only the files that have changed since the last full backup
Differential backup
43
Which backup method is this: | fast backup method; requires minimal storage space to back up
Differential backup
44
Which backup method is this: | recovery is time-consuming because the last full backup plus the differential backup are needed
Differential backup
45
Which backup method is this: | copies only the files that have changed since the last full or incremental backup
Incremental backup
46
Which backup method is this: | fastest backup method
Incremental backup
47
Which backup method is this: | requires minimal storage space to back up, only most recent changes saved
Incremental backup
48
Which backup method is this: recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed
Incremental backup
49
Which backup method is this: | users choose which folders and files to include in a backup
Selective backup
50
Which backup method is this: | fast backup method, provides great flexibility
Selective backup
51
Which backup method is this: | difficult to manage individual file backups
Selective backup
52
Which backup method is this: | least manageable of all the backup methods
Selective backup
53
Which backup method is this: | all data is backed up whenever a change is made
Continuous data protection (CDP)
54
Which backup method is this: | the only real-time backup, very fast recovery of data
Continuous data protection (CDP)
55
Which backup method is this: | very expensive and requires a great amount of storage
Continuous data protection (CDP)