Enhanced Discovering Computers ©2017, Essentials 1st Edition By Misty E. Vermaat - Test Bank

Enhanced Discovering Computers ©2017, Essentials 1st Edition By Misty E. Vermaat - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   1. Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or …

$19.99

Enhanced Discovering Computers ©2017, Essentials 1st Edition By Misty E. Vermaat – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

1. Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

  a. digital security risk b. information liability
  c. technical terrorism d. network compromise

 

ANSWER:   a
POINTS:   1
REFERENCES:   212
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

2. Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure?

  a. hacker b. script kiddie
  c. cyberextortionist d. cyberterrorist

 

ANSWER:   c
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

3. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

  a. hacker b. script kiddie
  c. cyberextortionist d. cyberterrorist

 

ANSWER:   b
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

4. Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

  a. hacker b. script kiddie
  c. cyberextortionist d. cyberterrorist

 

ANSWER:   d
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

5. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

  a. malware b. untrusted sources
  c. threats d. cybermalls

 

ANSWER:   a
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

6. What is the term for a program that performs a repetitive task on a network?

  a. zombie b. rootkit
  c. bot d. Trojan horse

 

ANSWER:   c
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

7. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

  a. distributed b. delayed
  c. limited d. staggered

 

ANSWER:   a
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

8. Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

  a. rebuking b. spoofing
  c. transmitting d. victimizing

 

ANSWER:   b
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

9. Which of the following is a federally funded Internet security research and development center?

  a. W3C b. NSF
  c. CERT/CC d. Internet2

 

ANSWER:   c
POINTS:   1
REFERENCES:   218
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

10. Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

  a. keygens b. indices
  c. rootkit d. back door

 

ANSWER:   d
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

11. Which of the following is not a security product developer?

  a. Adobe b. AVG
  c. McAfee d. Symantec

 

ANSWER:   a
POINTS:   1
REFERENCES:   220
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

12. Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

  a. PIN b. password
  c. secure key d. passterm

 

ANSWER:   b
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   DC140506
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

13. Which of the following is not a possessed object?

  a. PIN b. badge
  c. smart card d. key

 

ANSWER:   a
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

14. How much do fingerprint readers typically cost?

  a. less than $10 b. less than $100
  c. between $250 and $500 d. more than $1000

 

ANSWER:   b
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

15. Into which of the following kinds of ports do external fingerprint readers plug?

  a. parallel b. MIDI
  c. USB d. serial

 

ANSWER:   c
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

16. Which of the following can transmit germs?

  a. iris recognition systems b. digital forensics systems
  c. face recognition systems d. hand geometry systems

 

ANSWER:   d
POINTS:   1
REFERENCES:   226
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

17. Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

  a. site b. network
  c. distributed d. multipurpose

 

ANSWER:   b
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

18. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

  a. network b. distributed
  c. site d. multipurpose

 

ANSWER:   c
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

19. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

  a. re-securing b. decryption
  c. assessment d. digitization

 

ANSWER:   b
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

20. ​What occurs when someone steals personal or confidential information?

  a. information theft b. corruption
  c. fraud d. compaction

 

ANSWER:   a
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

21. Which type of individual may steal credit card numbers to make fraudulent purchases?

  a. corrupt b. Caesar
  c. administrator d. kiddie

 

ANSWER:   a
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

22. What is another name for public key encryption?

  a. controlled key encryption b. virtual key encryption
  c. asymmetric key encryption d. secure key encryption

 

ANSWER:   c
POINTS:   1
REFERENCES:   230
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

23. Which of the following provides the mobile user with a secure connection to the company network server?

  a. XPN b. SPN
  c. TPN d. VPN

 

ANSWER:   d
POINTS:   1
REFERENCES:   230
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

24. What is the term for a website that uses encryption techniques to protect its data?

  a. virtual site b. locked site
  c. secure site d. vault

 

ANSWER:   c
POINTS:   1
REFERENCES:   230
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

25. How long can digital certificates be valid?

  a. six months b. two years
  c. four years d. five years

 

ANSWER:   b
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

26. Which of the following is an authorized person or company that issues and verifies digital certificates?

  a. certificate authority b. certificate agency
  c. certificate office d. certificate bureau

 

ANSWER:   a
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

27. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

  a. assigned b. secure
  c. protected d. digital

 

ANSWER:   d
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

28. Which of the following terms means in a location separate from the computer site?

  a. off-scope b. off-shore
  c. off-line d. off-site

 

ANSWER:   d
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

29. Which of the following terms refers to making a copy of a file?

  a. restoring b. backing up
  c. encrypting d. deciphering

 

ANSWER:   b
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

30. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

  a. They reset the files. b. The index the files.
  c. They restore the files. d. They resource the files.

 

ANSWER:   c
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

31. Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

  a. restored file b. bot
  c. IP file d. backup

 

ANSWER:   d
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

32. With a three-generation backup policy, the grandparent is which of the following?

  a. most recent copy of the file b. second oldest copy of the file
  c. oldest copy of the file d. original file

 

ANSWER:   c
POINTS:   1
REFERENCES:   234
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

33. Which of the following copies all of the files in a computer?

  a. full backup b. incremental backup
  c. differential backup d. selective backup

 

ANSWER:   a
POINTS:   1
REFERENCES:   234
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

34. With which of the following do users choose which folders and files to include in a backup?

  a. full backup b. incremental backup
  c. differential backup d. selective backup

 

ANSWER:   d
POINTS:   1
REFERENCES:   234
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

35. One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

  a. 25 b. 35
  c. 55 d. 75

 

ANSWER:   a
POINTS:   1
REFERENCES:   236
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   DC140516
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

36. Which of the following categories are the rights to which creators are entitled for their work?

  a. community property b. intellectual property
  c. creative d. ethical

 

ANSWER:   b
POINTS:   1
REFERENCES:   240
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

37. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

  a. PGP b. DoS
  c. IP d. TCP

 

ANSWER:   c
POINTS:   1
REFERENCES:   240
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

38. Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

  a. intellectual property deed b. content license
  c. access right d. copyright

 

ANSWER:   d
POINTS:   1
REFERENCES:   240
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

39. Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

  a. CAN-SPAM Act b. Computer Abuse Amendments Act
  c. COPPA d. Electronic Communication Privacy Act

 

ANSWER:   d
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

40. An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

  a. practical b. permissible
  c. acceptable d. ethical

 

ANSWER:   d
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

41. Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

  a. ENERGY STAR b. SECURE ELECTRONICS
  c. ACCEPTABLE USE d. GREEN COMPUTING

 

ANSWER:   a
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

42. Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

  a. data rights b. acceptable use
  c. social restrictions d. information privacy

 

ANSWER:   d
POINTS:   1
REFERENCES:   242
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

43. Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?

  a. worm b. spike
  c. cookie d. payload

 

ANSWER:   c
POINTS:   1
REFERENCES:   243
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   DC140523
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

44. Websites use which of the following to keep track of items in a user’s shopping cart?

  a. session cookie b. zombie
  c. adware d. shopping bot

 

ANSWER:   a
POINTS:   1
REFERENCES:   243
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

45. Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

  a. spam b. spit
  c. phishing d. spyware

 

ANSWER:   c
POINTS:   1
REFERENCES:   244
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

46. Internet advertising firms often use which of the following to collect information about users web browsing habits?

  a. comware b. postware
  c. spyware d. billware

 

ANSWER:   c
POINTS:   1
REFERENCES:   245
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

47. Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

  a. Electronic Communications Privacy Act (ECPA)
  b. Fair Credit Reporting Act
  c. Computer Fraud and Abuse Act
  d. Computer Matching and Privacy Protection Act

 

ANSWER:   a
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

48. Which of the following is the process of restricting access to certain material on the web?

  a. text remastering b. content filtering
  c. indexing d. material masking

 

ANSWER:   b
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

49. Many businesses use which of the following to limit employees’ web access?

  a. content filtering b. web bugs
  c. honeypots d. spyware

 

ANSWER:   a
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

50. Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

  a. manager filtering b. employee monitoring
  c. job spamming d. employee indexing

 

ANSWER:   b
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

COGNITIVE ASSESSMENT

 

51. Which of the following best describes the term, cybercrime?

  a. online or Internet-based illegal acts
  b. any illegal act involving a computer
  c. a type of gaming software that simulates criminal acts
  d. using the Internet to apprehend and prosecute criminals

 

ANSWER:   a
POINTS:   1
REFERENCES:   212
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

52. Which term is used to describe software used by cybercriminals?

  a. cyberware b. conware
  c. criminalware d. crimeware

 

ANSWER:   d
POINTS:   1
REFERENCES:   212
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

53. Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

  a. script kiddie b. cracker
  c. cyberextortionist d. cyberterrorist

 

ANSWER:   b
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

54. Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

  a. script kiddie b. cracker
  c. cyberextortionist d. cyberterrorist

 

ANSWER:   d
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

55. Which of the following statements is not true about Internet and network attacks?

  a. No central administrator is present on the Internet.
  b. It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
  c. Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
  d. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

 

ANSWER:   c
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

56. Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

  a. a virus b. a worm
  c. a Trojan horse d. a rootkit

 

ANSWER:   b
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

57. What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?

  a. malware b. cybersoft
  c. evilapp d. viralware

 

ANSWER:   a
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

58. The term, payload, as it pertains to computer crime, is defined as _____________.

  a. the money a criminal receives from extortion or other computer crimes
  b. the amount of data loss to a company or individual who is a victim of a computer crime
  c. the destructive event or prank the program is intended to deliver
  d. the financial burden computer crime places on its victims

 

ANSWER:   c
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

59. Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

  a. a virus b. a worm
  c. a Trojan horse d. a rootkit

 

ANSWER:   d
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

60. The term, botnet, means _____________.

  a. a program that performs a repetitive task on a network
  b. spam sent via email to spread viruses or commit a distributed denial of service attack
  c. a group of compromised computers connected to a network that attacks other networks
  d. a computer whose owner is unaware that the computer is being controlled remotely by an outsider

 

ANSWER:   c
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

61. A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

  a. sending spam via email
  b. spreading viruses
  c. committing a distributed denial of service attack
  d. authoring ActiveX scripts

 

ANSWER:   d
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

62. The term, zombie, is _____________.

  a. a program that performs a repetitive task on a network
  b. spam sent via email to spread viruses or commit a distributed denial of service attack
  c. a group of compromised computers connected to a network that attacks other networks
  d. a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

 

ANSWER:   d
POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

63. Which of the following is the least likely motive for a DDoS?

  a. political anger b. spoofing
  c. extortion d. negative recognition

 

ANSWER:   b
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

64. What happens during a DDoS attack?

  a. An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
  b. Antivirus software disables a virus and protects the computer or network from unauthorized access.
  c. The police use a virus and other measures to take down a network of computer criminals.
  d. A zombie army is used to attack computers or computer networks.

 

ANSWER:   d
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

65. The term back door, as it refers to computer crime, is _____________.

  a. the area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future
  b. a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
  c. the vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
  d. a weakness in a computer or network’s security system that enables criminals to gain unauthorized access

 

ANSWER:   b
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

66. Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

  a. spoofing b. phishing
  c. veiling d. costuming

 

ANSWER:   a
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

67. The term firewall is _____________.

  a. the access point a hacker uses to intrude on a computer or network
  b. a program that searches for cybercriminals by looking for patterns in attacks
  c. hardware and/or software that protects a network’s resources from intrusion
  d. a virus that prevents the computer or network from accessing outside resources

 

ANSWER:   c
POINTS:   1
REFERENCES:   219
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

68. What is an AUP intended to do?

  a. license software for individual use
  b. outline computer activities for which the computer and network may or may not be used
  c. contract with an outside organization to provide security and recovery services for a network
  d. establish a network of computers, such as a homegroup

 

ANSWER:   b
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

69. You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

  a. CAPTCHA b. CERT/CC
  c. two-step verification d. serial authentication

 

ANSWER:   a
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

70. Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

  a. an access control b. an attempt log
  c. an attack index d. an audit trail

 

ANSWER:   d
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

71. The term CAPTCHA is _____________.

  a. a private combination of words associated with a user name that allows access to computer resources
  b. the average time it takes a computer to discover a password based on the number of characters
  c. a digital image used to help decipher a faded or blurry word in digitized news archives
  d. a series of distorted characters that a user is required to enter correctly to continue using a website

 

ANSWER:   d
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

72. Which of the following does your daughter’s daycare use to verify the identity of parents who pick up their children?

  a. face recognition system b. iris recognition system
  c. hand geometry system d. digital forensics system

 

ANSWER:   c
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

73. The term, PIN, is an acronym for which of the following?

  a. personal identification number b. private Internet notification
  c. possessed information number d. personal information network

 

ANSWER:   a
POINTS:   1
REFERENCES:   223
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

74. Which of the following does your new smartphone use to unlock the device?

  a. hand geometry system b. face recognition system
  c. iris recognition system d. digital forensics system

 

ANSWER:   b
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

75. Which of the following does your company use to track your time and attendance?

  a. face recognition system b. iris recognition system
  c. hand geometry system d. digital forensics system

 

ANSWER:   c
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

76. Which of the following does your college use to verify your identity?

  a. face recognition system b. iris recognition system
  c. hand geometry system d. digital forensics system

 

ANSWER:   c
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

77. Which of the following does your financial institution use to reduce fraud?

  a. digital forensics system b. iris recognition system
  c. signature verification system d. hand geometry system

 

ANSWER:   c
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

78. Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

  a. digital forensics system b. voice verification system
  c. iris recognition system d. hand geometry system

 

ANSWER:   b
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

79. Which of the following does a new federal laboratory use in its high security areas?

  a. signature verification system b. digital forensics system
  c. hand geometry system d. iris recognition system

 

ANSWER:   d
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

80. Which of the following statements is not true about biometric devices?

  a. Personal characteristics are unique and cannot be forgotten or misplaced.
  b. Biometric devices are an unreliable method of identification and notification.
  c. Examples include fingerprint readers and hand geometry systems.
  d. Biometric devices translate a personal characteristic into a digital code.

 

ANSWER:   b
POINTS:   1
REFERENCES:   226
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

81. What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

  a. cybersleuthing b. digital forensics
  c. system analysis d. data mining

 

ANSWER:   b
POINTS:   1
REFERENCES:   227
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

82. Which of the following can be used to create a software registration number, sometimes illegally?

  a. BSA b. decryption key
  c. keygen d. public key

 

ANSWER:   c
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

83. You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

  a. software deployment b. software decryption
  c. app installation d. product activation

 

ANSWER:   d
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

84. When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

  a. information theft b. software theft
  c. digital forensics d. decryption

 

ANSWER:   a
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

85. Unless you want to allow others to follow your locations throughout the day, disable the ____ tracking feature.

  a. IP b. GPS
  c. BIOS d. NET

 

ANSWER:   b
POINTS:   1
REFERENCES:   223
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

86. ​

____ apps can allow you to lock your mobile device and SIM card remotely.

  a. mobile security b. remote security
  c. mobile tech d. SIM security

 

ANSWER:   a
POINTS:   1
REFERENCES:   223
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

87. ​

According to some estimates, ____ mobile phones are lost or stolen in the United States every minute.

  a. 1130 b. 57
  c. 113 d. 943

 

ANSWER:   c
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

88. What is an EULA intended to do?

  a. license software for individual use
  b. outline computer activities for which the computer and network may or may not be used
  c. contract with an outside organization to provide security and recovery services for a network
  d. establish a network of computers, such as a homegroup

 

ANSWER:   a
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

89. Which of the following statements is not true about software theft?

  a. A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
  b. Software piracy is the unauthorized and illegal duplication of copyrighted software.
  c. With a single-user license agreement, users are permitted to make one copy of the software as a backup.
  d. Software theft includes disabling or removing programs from company computers.

 

ANSWER:   a
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

90. ​

What type of software restricts access to specified websites?

  a. spam filtering b. net filtering
  c. web filtering d. phishing

 

ANSWER:   c
POINTS:   1
REFERENCES:   234
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

91. Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

  a. a certificate authority b. a digital signature
  c. an encryption key d. a hash

 

ANSWER:   b
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

92. Which of the following statements is not a safeguard against the failure of hardware?

  a. surge protectors b. fault-tolerant computers
  c. device-tracking apps d. UPS

 

ANSWER:   c
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.6 – 6
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

93. Which of the following statements is not true about backing up?

  a. Backup programs are available from many sources.
  b. Continuous data protection typically is used only by large enterprises.
  c. With a selective backup, all of the files in the computer automatically are chosen to be copied.
  d. A backup is a duplicate of a file, program, or disk.

 

ANSWER:   c
POINTS:   1
REFERENCES:   233
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

94. Which of the following statements is not true about intellectual property rights?

  a. The term fair use refers to the rights which creators are entitled for their work.
  b. Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
  c. A copyright protects any tangible form of expression.
  d. Digital rights management is a strategy designed to prevent illegal distribution of digital content.

 

ANSWER:   a
POINTS:   1
REFERENCES:   240
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

95. Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

  a. a software license b. an IT code of conduct
  c. digital rights management d. fair use

 

ANSWER:   b
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

96. In order to safeguard your personal information, which of the following is recommended?

  a. Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
  b. Clear your history file when you are finished browsing.
  c. Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
  d. Use shopping club and buying cards when shopping to remain anonymous.

 

ANSWER:   b
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

97. Which of the following terms is used to describe a small text file that a web server stores on your computer?

  a. a breadcrumb b. a nugget
  c. a cracker d. a cookie

 

ANSWER:   d
POINTS:   1
REFERENCES:   243
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

98. What term is used to describe the process of restricting access to certain material on the web?

  a. content filtering b. information monitoring
  c. data mining d. social profiling

 

ANSWER:   a
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

99. Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

  a. war driving b. spitting
  c. clickjacking d. spimming

 

ANSWER:   c
POINTS:   1
REFERENCES:   245
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

100. Social engineering, as it pertains to computers, is _____________.

  a. creating consumer and personal profiles by tracking website history and electronic purchases
  b. compiling data from multiple computer users in order to make predictions about computer trends
  c. filtering Internet content to targeted users based on their personal preferences
  d. gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

 

ANSWER:   d
POINTS:   1
REFERENCES:   245
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
PREFACE NAME:   CA
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

101. Any illegal act involving a computer generally is referred to as a computer crime.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   212
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

102. Combating cybercrime is not one of the FBI’s top priorities.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   212
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

103. Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

104. A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

105. Programmers often build trapdoors into programs during system development.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

106. A rootkit can be a back door.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

107. Perpetrators of back doors trick their victims into interacting with phony websites.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

108. Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   219
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

109. Both Windows and Mac operating systems include firewall capabilities.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   219
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

110. Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

111. Audit trails only record unsuccessful access attempts.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

112. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   True / False
HAS VARIABLES:   False
PREFACE NAME:   DC140506
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

113. If a program or device has a default password, be sure to retain it.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

114. PINs are not the same as passwords.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   223
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

115. If you are nervous, a signature might not match the one on file in a signature verification system.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

116. A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   227
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

117. Biometric objects are entirely foolproof.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   226
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

118. To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   227
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

119. Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

120. Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

121. Secure sites typically use digital certificates along with security protocols.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

122. Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

123. Analog signatures help to prevent email forgery.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.5 – 5
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

124. Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   236
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

125. Any device that connects to the Internet is susceptible to mobile malware.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   236
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

126. One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

127. One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

128. Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   244
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

129. Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart as shown in the accompanying figure.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   244
QUESTION TYPE:   True / False
HAS VARIABLES:   False
PREFACE NAME:   DC140523
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

130. Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   244
QUESTION TYPE:   True / False
HAS VARIABLES:   False
PREFACE NAME:   DC140523
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

131. Your browsing history is a list of all websites you have visited over a period of time.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   242
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

132. During virtual browsing, your browser does not keep track of the websites you are visiting.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

133. Proximity sharing gives websites access to your current location.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   237
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

134. Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   244
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

135. To remove spyware, users need to obtain a special program that can detect and delete it.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

136. Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   243
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

137. To protect yourself from social engineering scams, shred all sensitive or confidential documents.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

138. Many businesses use spyware to limit employees’ web access.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   245
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

139. COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

140. The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
PREFACE NAME:   DC140502
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

141. The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

142. FOIA enables public access to most government records.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

143. If a company does not have a formal email policy, it can read email messages without employee notification.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

144. HIPAA protects individuals against the wrongful disclosure of their health information.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

145. The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

146. The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   246
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

147. It is illegal for employers to use software programs that monitor employees.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.11 – 10
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

148. Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

149. Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

  a. True
  b. False

 

ANSWER:   True
POINTS:   1
REFERENCES:   247
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

150. COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

  a. True
  b. False

 

ANSWER:   False
POINTS:   1
REFERENCES:   248
QUESTION TYPE:   True / False
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

151. The term ____________________ describes an attack whose goal ranges from disabling a government’s computer network to crippling a country.

ANSWER:   cyberwarfare
POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

152. A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

ANSWER:   rootkit
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

153. Computer viruses like the kind in the accompanying figure—along with worms, and Trojan horses—deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

ANSWER:   payload
POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Completion
HAS VARIABLES:   False
PREFACE NAME:   DC140502
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

154. A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

ANSWER:   online security service
POINTS:   1
REFERENCES:   219
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

155. A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

ANSWER:   denial of service
DoS
denial of service (DoS)
DoS (denial of service)
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

156. A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

ANSWER:   back door
POINTS:   1
REFERENCES:   217
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

157. To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

ANSWER:   AUP
acceptable use policy
AUP (acceptable use policy)
acceptable use policy (AUP)
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

158. A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

ANSWER:   access
POINTS:   1
REFERENCES:   222
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

159. A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

ANSWER:   possessed
POINTS:   1
REFERENCES:   213
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

160. A(n) ____________________ device authenticates a person’s identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

ANSWER:   biometric
POINTS:   1
REFERENCES:   224
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.3 – 3
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

161. ____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

ANSWER:   Digital forensics
POINTS:   1
REFERENCES:   227
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

162. A(n) ____________________ agreement is the right to use software.

ANSWER:   license
POINTS:   1
REFERENCES:   225
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

163. The most common type of license included with software purchased by individual users is a(n) ____________________.

ANSWER:   end-user license agreement
EULA
EULA (end-user license agreement)
end-user license agreement (EULA)
single-user license agreement
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

164. ____________________ is the unauthorized and illegal duplication of copyrighted software.

ANSWER:   Software piracy
Piracy
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

165. ____________________ occurs when someone steals personal or confidential information.

ANSWER:   Information theft
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

166. ____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

ANSWER:   Encryption
POINTS:   1
REFERENCES:   229
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.6 – 6
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

167. A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

ANSWER:   digital
POINTS:   1
REFERENCES:   231
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.6 – 6
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

168. A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

ANSWER:   disaster recovery plan
POINTS:   1
REFERENCES:   234
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.7 – 7
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

169. A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

ANSWER:   SSID
service set identifier
SSID (service set identifier)
service set identifier (SSID)
POINTS:   1
REFERENCES:   236
QUESTION TYPE:   Completion
HAS VARIABLES:   False
PREFACE NAME:   DC140516
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

170. Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

ANSWER:   code of conduct
POINTS:   1
REFERENCES:   241
QUESTION TYPE:   Completion
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

171. Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

• The term hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.
• A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills.
• A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use prewritten hacking and cracking programs to break into computers and networks.
• Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information, or to help identify security risks in their own organization. Unscrupulous companies hire corporate spies, a practice known as corporate espionage, to gain a competitive advantage.
• Unethical employees may break into their employers’ computers for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information. Disgruntled employees may want revenge.
• A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.
• A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. The cyberterrorist might target the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructure. The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

POINTS:   1
REFERENCES:   214
QUESTION TYPE:   Essay
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

172. Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. Some malware contains characteristics in two or more classes. For example, a single threat could contain elements of a virus, worm, and Trojan horse. Some websites maintain lists of known malware.

Malware can deliver its payload, or destructive event or prank, on a computer or mobile device in a variety of ways, such as when a user opens an infected file, runs an infected program, connects an unprotected computer or mobile device to a network, or when a certain condition or event occurs, such as the computer’s clock changing to a specific date. A common way that computers and mobile devices become infected with viruses and other malware is through users opening infected email attachments.

Common types of malware include:

Virus: A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.
Worm: A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.
Trojan horse: A program that hides within or looks like a legitimate program. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers or devices.
Rootkit: A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
Spyware: A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware: A program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.

POINTS:   1
REFERENCES:   215
QUESTION TYPE:   Essay
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

173. Describe botnets and denial of service attacks.

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

A botnet, or zombie army, is a group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes. A compromised computer or device, known as a zombie, is one whose owner is unaware the computer or device is being controlled remotely by an outsider.

A bot is a program that performs a repetitive task on a network. Cybercriminals install malicious bots on unprotected computers and devices to create a botnet. The perpetrator then uses the botnet to send spam via email, spread viruses and other malware, or commit a distributed denial of service attack.

A denial of service attack (DoS attack) is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email. Perpetrators carry out a DoS attack in a variety of ways. For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network. The victim computer network slows down considerably and eventually becomes unresponsive or unavailable, blocking legitimate visitors from accessing the network.

A more devastating type of DoS attack is the distributed DoS attack (DDoS attack) in which a zombie army is used to attack computers or computer networks. DDoS attacks have been able to stop operations temporarily at numerous websites, including powerhouses such as Yahoo!, eBay, Amazon.com, and CNN.com.

The damage caused by a DoS or DDoS attack usually is extensive. During the outage, retailers lose sales from customers, news websites and search engines lose revenue from advertisers, and time-sensitive information may be delayed. Repeated attacks could tarnish reputations, causing even greater losses.

POINTS:   1
REFERENCES:   216
QUESTION TYPE:   Essay
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

174. Discuss the measures you can take to safeguard home computers and devices.

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

Sophisticated cybercriminals take advantage of the fact that most home users employ poor security measures. In fact, one study found that home users are victims of 86 percent of all attacks. Instead of resorting to large-scale attacks affecting thousands of users simultaneously, these criminals develop fraud, data theft, and other wealth-generating schemes affecting individual users. In these cases, the users are forced to be reactive in repairing the damage done. The following measures, however, can help home users become proactive by preventing Internet and network attacks.
• Use routers and firewalls. These devices can help detect suspicious activities by continuously monitoring activity and blocking unauthorized entry into the computer. Antivirus software can help thwart attacks that slip by the firewall.
• Disable macro security settings. Macros are useful to record, save, and then execute a set of keystrokes and instructions repeatedly, and they commonly are found in word processing and spreadsheet files. Macros, however, can be disastrous when hidden in a file and then run without permission. In many office productivity applications, you can change the macro security settings so that macros are executed only with your permission.
• Address software warnings. Be wary of tapping or clicking buttons or security bars that seek permission to download or run a program. If you are suspicious of the authenticity, exit the program or leave the website.
• Keep software updated. Major software companies release software patches to repair known vulnerabilities. Many times, home users could have prevented their attacks if they had updated their software with the available patches.
• Stay informed. News media and technology websites report current security breaches and threats. Seek out these articles and take preventive measures.

POINTS:   1
REFERENCES:   220
QUESTION TYPE:   Essay
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.2 – 2
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

175. Discuss the four types of software theft.

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

Software theft occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.
• Physically stealing software: A perpetrator physically steals the media that contains the software, or steals the hardware that contains the media that contains the software. For example, an unscrupulous library patron might steal a game CD/DVD.
• Intentionally erasing software: A perpetrator erases the media that contains the software. For example, a programmer who is terminated from a company may retaliate by removing or disabling the programs he or she has written from company computers.
• Illegal registration/activation: A perpetrator illegally obtains registration numbers and/or activation codes. A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes. Some unscrupulous individuals create and post keygens so that users can install software without legally purchasing it.
• Illegal copying: A perpetrator copies software from manufacturers. Software piracy, often referred to simply as piracy, is the unauthorized and illegal duplication of copyrighted software. Piracy is the most common form of software theft.

POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Essay
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

 

176. Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

ANSWER:   Student responses will vary, but should be drawn from the following information from the text.

• Immediately upon connecting your wireless access point and/or router, change the password required to access administrative features. If the password remains at its default setting, others may possibly be able to connect to and configure your wireless network settings.
• Change the SSID (service set identifier), which is a network name, from the default to something that uniquely identifies your network, especially if you live in close proximity to other wireless networks.
• Do not broadcast the SSID. This will make it more difficult for others to detect your wireless network. When you want to connect a computer or mobile device to your wireless network, it will be necessary to enter the SSID manually.
• Enable an encryption method such as WPA2 (Wi-Fi Protected Access 2), and specify a password or passphrase that is difficult for others to guess. Passwords and passphrases that are more than eight characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
• Enable and configure the MAC (Media Access Control) address control feature. A MAC address is a unique hardware identifier for your computer or device. The MAC address control feature specifies the computers and mobile devices that can connect to your network. If a computer or device is not specified, it will not be able to connect.
• Choose a secure location for your wireless router so that unauthorized people cannot access it. Someone who has physical access to a wireless router can restore factory defaults and erase your settings.

POINTS:   1
REFERENCES:   236
QUESTION TYPE:   Essay
HAS VARIABLES:   False
PREFACE NAME:   DC140516
LEARNING OBJECTIVES:   VERR.DICO.15.8 – 8
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

177. One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.

Which of the following is NOT permissible under a single-user license agreement?

a. Jamie installs Quark Xpress on a single computer.
b. Christine leases her copy of Dreamweaver.
c. Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
d. Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.

 

ANSWER:   B
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   4/28/2015 9:58 PM

 

178. One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.

Which of the following practice IS permissible under a single-user license agreement?

a. Ahmed rents his copy of Adobe Illustrator.
b. The lab administrator at the college installs Fireworks on the school computer lab network.
c. Karen installs Flash on one desktop computer and one notebook computer.
d. Perry gives a copy of Microsoft Word 2013 to his friend, while continuing to use the software.

 

ANSWER:   C
POINTS:   1
REFERENCES:   228
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.4 – 4
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   4/28/2015 9:59 PM

 

179. In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.

Which of the following is NOT a question of technology ethics?

a. Users are required to provide a software product’s 25-character identification number before installing software.
b. A student copies text from the web and uses it in a research paper for his English class.
c. A student who has been expelled from school installs a computer virus on a computer in the student lab.
d. Someone copies The DaVinci Code to the web and encourages others to read it.

 

ANSWER:   A
POINTS:   1
REFERENCES:   238
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   4/28/2015 9:59 PM

 

180. In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.

Which of the following is not a frequently discussed area of technology ethics?

a. green computing
b. information accuracy
c. information authorship
d. codes of conduct

 

ANSWER:   C
POINTS:   1
REFERENCES:   238
QUESTION TYPE:   Subjective Short Answer
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.9 – 9
TOPICS:   Critical Thinking
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   4/28/2015 10:00 PM

 

Identify the letter of the choice that best matches the phrase or definition.

a. digital signature
b. digital certificate
c. CA
d. digital security risk
e. firewall
f. botnet
g. zombie
h. clickjacking
i. Digital Millennium Copyright Act (DCMA)
j. DoS attack
k. AUP
l. iris recognition system
m. web filtering software
n. password
o. script kiddie
p. ciphertext
q. plaintext
r. bot
s. piracy
t. copyright

 

REFERENCES:   212
214
216
219
223
224
232
233
238
245
238
245
246
245
QUESTION TYPE:   Matching
HAS VARIABLES:   False
LEARNING OBJECTIVES:   VERR.DICO.15.1 – 1
VERR.DICO.15.11 – 10
VERR.DICO.15.2 – 2
VERR.DICO.15.3 – 3
VERR.DICO.15.4 – 4
VERR.DICO.15.5 – 5
VERR.DICO.15.9 – 9
DATE CREATED:   3/11/2015 2:57 PM
DATE MODIFIED:   3/11/2015 2:57 PM

 

181. Usually does not have advanced computer and technical skills.

ANSWER:   o
POINTS:   1

 

182. A group of compromised computers.

ANSWER:   f
POINTS:   1

 

183. A program that restricts access to specified websites.

ANSWER:   m
POINTS:   1

 

184. Most systems require that a user selects this on his or her own.

ANSWER:   n
POINTS:   1

 

185. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.

ANSWER:   g
POINTS:   1

 

186. An authorized person or company that issues and verifies digital certificates.

ANSWER:   c
POINTS:   1

 

187. Any event or action that could cause a loss of or damage to computer or mobile device hardware.

ANSWER:   d
POINTS:   1

 

188. In the encryption process, the unencrypted, readable data.

ANSWER:   q
POINTS:   1

 

189. In the encryption process, the encrypted (scrambled) data.

ANSWER:   p
POINTS:   1

 

190. Protects a network’s resources from intrusion.

ANSWER:   e
POINTS:   1

 

191. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

ANSWER:   a
POINTS:   1

 

192. Protects any tangible form of expression.

ANSWER:   t
POINTS:   1

 

193. A common infringement of copyright.

ANSWER:   s
POINTS:   1

 

194. A notice that guarantees a user or a website is legitimate.

ANSWER:   b
POINTS:   1

 

195. A program that performs a repetitive task on a network.

ANSWER:   r
POINTS:   1

 

196. A scam in which a button or link on a website contains a malicious program.

ANSWER:   h
POINTS:   1

 

197. Biometric device used in high security areas.

ANSWER:   l
POINTS:   1

 

198. Makes it illegal to circumvent antipiracy schemes in commercial software.

ANSWER:   i
POINTS:   1

 

199. Outlines the activities for which a computer or network may and may not be used.

ANSWER:   k
POINTS:   1

 

200. An assault whose purpose is to disrupt computer access to an Internet service

ANSWER:   j
POINTS:   1

 

 

Additional information

Add Review

Your email address will not be published. Required fields are marked *