Module 8 Flashcards

(80 cards)

1
Q

Web sites use a ____ to keep track of items in a user’s shopping cart.

A

SESSION COOKIE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.

A

Computer Vision Syndrome (CVS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.

A

Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TRUE OR FALSE: Some operating systems and e-mail programs allows you to encrypt the contents of files and messages that are stored in your computer.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TRUE OR FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TRUE OR FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.

A

Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TRUE OR FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TRUE OR FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Employee __ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.

A

MONITORING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TRUE OR FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts.

A

OVERVOLTAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) ____ program secretly collects information about a user.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To ________ a file means to make a copy of it.

A

BACK UP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Computer ____ occurs when a computer consumes someone’s entire social life.

A

ADDICTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TRUE OR FALSE: Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TRUE OR FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.

A

FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An online UPS switches to battery power when a problem occurs in the power line.
FALSE
26
Software ____ is the unauthorized and illegal duplication of copyrighted software.
THEFT
27
Web ____ software is a program that restricts access to specified Web sites.
FILTERING
28
TRUE OR FALSE: Assume that because information is on the Web, it is accurate.
FALSE
29
A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
CYBERTERRORIST
30
TRUE OR FALSE: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
FALSE
31
_______ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
NOISE
32
TRUE OR FALSE: Biometric objects often are used in combination with personal identification numbers.
FALSE
33
TRUE OR FALSE: Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.
FALSE
34
TRUE OR FALSE: Many businesses use spyware to limit employees’ Web access.
FALSE
35
TRUE OR FALSE: Hardware theft is the act of stealing computer equipment.
TRUE
36
____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information.
PHISHING
37
38
__ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
INTRUSION
39
TRUE OR FALSE: To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret.
FALSE
40
TRUE OR FALSE: For a computer workspace, ergonomIcs experts recommend an area smaller than two by four feet.
FALSE
41
Content ____ is the process of restricting access to certain material on the Web.
FILTERING
42
TRUE OR FALSE: To remove spyware, users need to obtain a special program that can detect and delete it.
TRUE
43
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
SPYWARE
44
Many businesses use ________ to limit employees' web access.
CONTENT FILTERING
45
TRUE OR FALSE: Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
FALSE
46
Digital forensics is used by ____.
ALL OTHER CHOICES ARE CORRECT
47
TRUE OR FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon.
FALSE
48
A(n) ________ is someone who uses e-mail as a vehicle for extortion.
CYBEREXTORTIONIST
49
TRUE OR FALSE: It is illegal for employers to use software programs that monitor employees.
FALSE
50
TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
TRUE
51
A(n) ________ occurs when the electrical supply drops.
UNDERVOLTAGE
52
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
DISTRIBUTED
53
Many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.
PASSWORD
54
TRUE OR FALSE: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network.
TRUE
55
Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
WAR DRIVING
56
TRUE OR FALSE: The higher a surge protector’s Joule rating, the poorer the protection.
FALSE
57
58
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.
THEFT
59
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
ELECTRONIC COMMUNICATIONS PRIVACY ACT (ECPA)
60
TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss.
FALSE
61
TRUE OR FALSE: Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.
TRUE
62
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
ENERGY STAR
63
To prevent repetitive strain injury, take all of the following precautions except ____.
USE THE HEEL OF THE HAND AS A PIVOT POINT WHILE TYPING OR USING THE MOUSE
64
A(n) __________ has the same intent as a cracker but does not have the technical skills and knowledge.
SCRIPT KIDDIE
65
TRUE OR FALSE: A surge protector absorbs small overvoltages — generally without damage to the computer or equipment.
TRUE
66
67
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
MONITORING
68
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
RSI
69
TRUE OR FALSE: A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail.
FALSE
70
A system ________ is the prolonged malfunction of a computer.
FAILURE
71
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations.
MALWARE
72
73
TRUE OR FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.
FALSE
74
TRUE OR FALSE: A brownout is a complete power failure.
FALSE
75
TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss.
FALSE
76
In the case of system failure or the discovery of corrupted files, users _____ the files by copying the backed up files to their original location on a computer.
RESTORE
77
TRUE OR FALSE: Computer addiction is an untreatable illness.
FALSE
78
TRUE OR FALSE: Any illegal act involving a computer generally is referred to as a computer security risk.
FALSE
79
TRUE OR FALSE: A spyware program communicates information it collects to some inside source while a user is offline.
FALSE
80
___________, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate,
Transport Layer Security (TLS)