Module 5: Digital Security, Ethics, and Privacy

  1. You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.

    FERPA regulates the confidentiality of .

    1. criminal records
    2. financial transactions
    3. user names and passwords
    4. students’ educational records
  2. IP occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
    Answer: spoofing
  3. Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
    Answer: True
  4. A hand geometry system measures the size and shape of a person’s hand.
    Answer: True
  5. Encryption is one safeguard against information theft.
    Answer: True
  6. A(n) verification system compares a person’s live speech with their stored speech pattern.
    Answer: voice
  7. Which of the following is not a green computing recommendation?
    1. Purchase low-efficiency equipment.
    2. Use outside air to cool the data center when possible.
    3. Consolidate servers by using virtualization.
    4. Use sleep modes and other power management features.
  8. You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
    1. worm
    2. virus
    3. trojan horse
    4. rootkit
  9. Two users can have the same email address.
    Answer: False
  10. A(n) backup copies only the files that have changed since the last full backup.
    1. differential
    2. selective
    3. partial
    4. incremental
  11. Identify the letter of the choice that best matches the phrase or definition.
    1. Hacker who usually does not have advanced computer and technical skills
      Answer: o. script kiddie
    2. A group of compromised computers
      Answer: f. botnet
    3. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
      Answer: g. zombie
    4. An authorized person or company that issues and verifies digital certificates
      Answer: c. CA
    5. Any event or action that could cause a loss of or damage to computer or mobile device hardware
      Answer: d. digital security risk
    6. In the encryption process, the unencrypted, readable data
      Answer: l. plaintext
    7. In the encryption process, the encrypted (scrambled) data
      Answer: i. ciphertext
    8. Protects a network’s resources from intrusion
      Answer: e. firewall
    9. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
      Answer: a. digital signature
    10. The unauthorized and illegal duplication of copyrighted software
      Answer: n. piracy
    11. A notice that guarantees a user or a website is legitimate
      Answer: b. digital certificate
    12. A program that performs a repetitive task on a network
      Answer: m. bot
    13. A scam in which a button or link on a website contains a malicious program
      Answer: h. clickjacking
    14. Outlines the activities for which a computer or network may and may not be used
      Answer: k. AUP
    15. An assault whose purpose is to disrupt computer access to an Internet service
      Answer: j. DoS attack
  12. Which of the following best describes a back door?
    1. A file recovery method that circumvents the computer or mobile device’s network.
    2. An invisible image on a website that, if accidentally clicked, downloads a virus to the user’s computer or mobile device.
    3. A hardware device that reinforces security settings on a computer or network.
    4. A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
  13. Which of the following is NOT true about two-step verification?
    1. ATMs usually require a two-step verification.
    2. When a system sends an authentication code, it typically does not expire.
    3. If you sign in from a device you use frequently, you can elect to bypass two-step verification.
    4. Another term for it is two-factor verification.
  14. A(n) demands payment to stop an attack.
    1. cracker
    2. script kiddie
    3. cyberextortionist
    4. hacker
  15. Piracy is the most common form of software theft.
    Answer: True
  16. Software used to fight cybercriminals is called crimeware.
    Answer: False
  17. You should disable GPS tracking on your mobile device unless you need to use it.
    Answer: True
  18. What is an audit trail?
    1. A log of financial transactions.
    2. A file that records access attempts.
    3. A record of hacking attempts.
    4. A list of passwords and user names on a network.
  19. Malware is short for software.
    1. malicious
    2. malady
    3. malignant
    4. malevolent
  20. What should an AUP specify?
    1. The guidelines for using licensed software.
    2. A list of IP addresses known to be safe.
    3. A user’s personal authentication methods.
    4. The acceptable use of technology by employees for personal reasons.
  21. With CDP, all data is backed up whenever a change is made.
    Answer: True
  22. Passcode is another term for a(n) .
    1. encryption algorithm
    2. PIN
    3. passphrase
    4. user name
  23. A rootkit can be a backdoor.
    Answer: True
  24. You want to ensure your wireless network is secure. Which of the following should you NOT do?
    1. Choose a secure location for your wireless router.
    2. Broadcast the SSID.
    3. Enable an encryption method such as WPA2.
    4. Retain the default administrative password.
  25. A(n) has a goal of destroying data or stealing information.
    1. cyberextortionist
    2. hacker
    3. cracker
    4. script kiddie
  26. You recently purchased a new laptop for home. You want to ensure that you are safe from malware.

    You should make sure to do all of the following EXCEPT .

    1. be cautious when clicking links in email
    2. always stay connected to the Internet
    3. use a firewall
    4. never click OK in a pop-up spyware window
  27. An encryption is a set of steps that converts readable text into unreadable text.
    1. series
    2. method
    3. key
    4. algorithm
  28. In case of system failure or the discovery of corrupted files, you files by copying backed up files to their original location.
    Answer: restore
  29. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
    Answer: True
  30. The destructive event or prank a malware delivers is its .
    Answer: payload
  31. A(n) is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.
    Answer: virus
  32. Email spoofing rarely is used in virus hoaxes and spam.
    Answer: False
  33. A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.
    Answer: site
  34. A(n) was originally a complimentary work for a computer enthusiast.
    1. hacker
    2. cyberextortionist
    3. cracker
    4. script kiddie
  35. For what purpose was the BSA formed?
    1. To fight against hacktivists.
    2. To enforce laws against cyberterrorists.
    3. To create an online resource for malware protection.
    4. To promote understanding of software piracy.
  36. is the process of converting data that is readable by humans into encoded characters.
    Answer: Encryption
  37. When a botnet is used to attack computers or networks, it is called a(n) DoS attack.
    1. distributed
    2. enterprise
    3. organized
    4. devastating
  38. Social is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.
    1. hacking
    2. misdirection
    3. manipulation
    4. engineering
  39. A(n) is a program that performs a repetitive task on a network.
    Answer: bot
  40. An iris recognition system uses technology to read patterns in the user’s .
    1. signature
    2. eye
    3. face
    4. fingerprints
  41. Security experts recommend using different user names and passwords for every account.
    Answer: True
  42. What does a keygen do?
    1. Generates a list of user names and passwords for network administrators.
    2. Analyzes typing patterns to authenticate a user.
    3. Creates CAPTCHA images.
    4. Creates software registration numbers.
  43. A(n) is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
    1. EULA
    2. code of conduct
    3. electronic profile
    4. IP
  44. Intentionally erasing software is not an example of software theft.
    Answer: False
  45. An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?
    1. restoration plan
    2. recovery plan
    3. building plan
    4. emergency plan
  46. Another term for botnet is army.
    1. spy
    2. ghost
    3. vampire
    4. zombie
  47. A password is a service that stores all of your account information securely.
    1. binder
    2. vault
    3. collection
    4. manager
  48. To protect files on your device’s hard drive from hackers, turn on file and printer sharing.
    Answer: False
  49. You recently purchased a new laptop for home. You want to ensure that you are safe from malware.

    You should install a personal , a program that protects your computer from unauthorized access by blocking certain types of communications.

    1. firewall
    2. blocker
    3. back door
    4. shield
  50. A(n) is a private combination of characters associated with a user name that allows access to certain computer resources.
    Answer: password
  51. Employers can use firewalls to restrict employees’ access to sensitive data.
    Answer: True
  52. Content filtering is the process of restricting access to certain material.
    Answer: True
  53. Badges, cards, smart cards, and keys are examples of objects.
    1. carried
    2. pocket
    3. wearable
    4. possessed
  54. With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
    Answer: False
  55. Passphrases are less secure than passwords.
    Answer: False
  56. A digital is a notice that guarantees a user or website is legitimate.
    Answer: certificate
  57. Which of the following is NOT true about CAPTCHAs?
    1. The CAPTCHA text can be read aloud for visually impaired users.
    2. CAPTCHAs were developed to verify input is coming from computer programs, not humans.
    3. A CAPTCHA is an image containing a series of distorted characters.
    4. You have the option of generating a new CAPTCHA.
  58. The website for CERT/CC provides information about Internet security breaches.
    Answer: True
  59. Digital is the discovery, collection, and analysis of evidence found on computers and networks.
    Answer: forensics
  60. A(n) often uses prewritten hacking and cracking programs.
    1. cyberextortionist
    2. hacker
    3. cracker
    4. script kiddie
  61. User IDs are also called user names, log on names, or sign in names.
    Answer: True
  62. If the web address of a website begins with https instead of http, what do you know about the website?
    1. It provides security services and information.
    2. It contains encrypted data.
    3. It likely is spoofed.
    4. It is secure.
  63. Which of the following is NOT a recommended practice for gaming safety?
    1. Use a firewall when using multiplayer online games.
    2. Avoid games requiring passwords to be saved to an online account on a smartphone.
    3. Check the developer of any software or apps to be certain it is legitimate.
    4. Look for games that use ActiveX or JavaScript, as these are always safe.
  64. Viruses, worms, and trojan horses replicate themselves to other computers or devices.
    Answer: False
  65. The term refers to online or Internet-based illegal acts.
    Answer: cybercrime
  66. Common digital security risks include information theft and system failure.
    Answer: True
  67. A(n) is a private combination of words associated with a user name that allows access to certain computer resources.
    Answer: passphrase
  68. An encryption is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
    1. code
    2. key
    3. algorithm
    4. password
  69. You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.

    Which of the following is NOT true about cloud data privacy?

    1. Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
    2. When transferring data over a network to the cloud, the data should be encrypted and authenticated.
    3. The company storing the data must protect against data loss due to physical disasters.
    4. Cloud storage companies have increased their privacy and security features in recent years.
  70. You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
    1. trojan horse
    2. rootkit
    3. worm
    4. virus
  71. PIN stands for personal identification .
    1. network
    2. note
    3. name
    4. number
  72. An access is a security measure that defines who can access a computer, device, or network.
    Answer: control
  73. Which of the following is NOT recommended to protect against hardware failure?
    1. cables and locks
    2. surge protector
    3. duplicate components
    4. UPS
  74. Which of the following best describes a single sign on account?
    1. An organization’s shared login credentials for general network access.
    2. An individual’s unique identity required to access an organization’s network.
    3. When you enter your name into one account and you are automatically signed into other accounts and services.
    4. A security measure that allows only one failed login attempt.
  75. Public key encryption is also called asymmetric key encryption.
    Answer: False
  76. Fingerprint readers are examples of devices.
    Answer: biometric
  77. Which of the following is NOT a part of a typical single-user license agreement?
    1. You cannot export the software.
    2. You cannot install the software on a network.
    3. You can make one copy of the software as a backup.
    4. You can rent or lease the software.
  78. A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.
    Answer: False
  79. If your computer’s operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.
    Answer: False
  80. A(n) screen restricts access to a computer or mobile device until a user performs a certain action.
    1. lock
    2. control
    3. check
    4. firewall

Leave a Reply

Thumbnails managed by ThumbPress