Passphrases Are Less Secure Than Passwords.

Question: Passphrases are less secure than passwords.

Answer: FALSE

Question: Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

Answer: TRUE

Question: A rootkit can be a backdoor.

Answer: TRUE

Question: Software used to fight cybercriminals is called crimeware.

Answer: FALSE

Question: The website for CERT/CC provides information about Internet security breaches.

Answer: TRUE

Question: IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

Answer: Spoofing

Question: In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.

Answer: Restore

Question: Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.

Answer: forensics

Question: A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

Answer: site

Question: A(n) ______ is a program that performs a repetitive task on a network.

Answer: bot

Question: Which of the following is NOT a part of a typical single-user license agreement?

Answer: you can rent or lease the software

Question: A(n) ______ often uses prewritten hacking and cracking programs.

Answer: script kiddie

Question: For what purpose was the BSA formed?

Answer: to promote understanding of software privacy

Question: A(n) ______ has a goal of destroying data or stealing information.

Answer: cracker

Question: Another term for botnet is ______ army.

Answer: zombie

Question: Which of the following is not recommended to protect against hardware failure?

Answer: cables and locks

Question: A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

Answer: code of conduct

Question: Malware is short for ______ software.

Answer: malicious

Question: Badges, cards, smart cards, and keys are examples of _____ objects.

Answer: possessed

Question: When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.

Answer: distributed

Question: Employers can use firewalls to restrict employees' access to sensitive data.

Answer: TRUE

Question: Intentionally erasing software is not an example of software theft.

Answer: FALSE

Question: If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.

Answer: FALSE

Question: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

Answer: FALSE

Question: Viruses, worms, and trojan horses replicate themselves to other computers or devices.

Answer: FALSE

Question: Which of the following is not a green computing recommendation?

Answer: purchase low-efficiency equipment

Question: PIN stands for personal identification ______.

Answer: number

Question: What does a keygen do?

Answer: Creates software registration numbers.

Question: You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

Answer: worm

Question: An encryption ______ is a set of steps that converts readable text into unreadable text.

Answer: algorithm

Question: Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.

Answer: engineering

Question: An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

Answer: key

Question: Which of the following is NOT a recommended practice for gaming safety?

Answer: look for games that use active X or java script as they are always safe

Question: Which of the following is NOT true about two-step verification?

Answer: When a system sends an authentication code, it typically does not expire.

Question: A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.

Answer: lock

Question: A digital ______ is a notice that guarantees a user or website is legitimate.

Answer: certificate

Question: What is an audit trail?

Answer: A file that records access attempts

Question: A password ______ is a service that stores all of your account information securely.

Answer: manager

Question: You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

Answer: rootkit

Question: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.FERPA regulates the confidentiality of ______.

Answer: students educational records

Question: What should an AUP specify?

Answer: The acceptable use of technology by employees for personal reasons

Question: If the web address of a website begins with https instead of http, what do you know about the website?

Answer: it is secure

Question: A(n) ______ verification system compares a person's live speech with their stored speech pattern.

Answer: voice

Question: Fingerprint readers are examples of ______ devices.

Answer: biometric

Question: ______ is the process of converting data that is readable by humans into encoded characters.

Answer: encryption

Question: Two users can have the same email address.

Answer: FALSE

Question: Common digital security risks include information theft and system failure.

Answer: TRUE

Question: A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.

Answer: FALSE

Question: A hand geometry system measures the size and shape of a person's hand.

Answer: TRUE

Question: Piracy is the most common form of software theft.

Answer: TRUE

Question: An access ______ is a security measure that defines who can access a computer, device, or network.

Answer: control

Question: A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Answer: virus

Question: Which of the following best describes a back door?

Answer: Computer programs used to bypass normal authentication or other security mechanisms in place.

Question: A(n) ______ often uses prewritten hacking and cracking programs.

Answer: script kiddie

Question: An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?

Answer: emergency plan

Question: The term ______ refers to online or Internet-based illegal acts.

Answer: cybercrime

Question: A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.

Answer: password

Question: User IDs are also called user names, log on names, or sign in names.

Answer: username

Question: You should disable GPS tracking on your mobile device unless you need to use it.

Answer: TRUE

Question: Which of the following best describes a single sign on account?

Answer: When you enter your name into one account and you are automatically signed into other accounts and services.

Question: A(n) ______ backup copies only the files that have changed since the last full backup.

Answer: differential

Question: You recently purchased a new laptop for home. You want to ensure that you are safe from malware.You should make sure to do all of the following EXCEPT ______.

Answer: always stay connected to the internet

Question: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.Which of the following is NOT true about cloud data privacy?

Answer: Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

Question: Public key encryption is also called asymmetric key encryption.

Answer: TRUE

Question: A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.

Answer: passphrase

Question: The destructive event or prank a malware delivers is its ______.

Answer: payload

Question: Which of the following is NOT true about CAPTCHAs?

Answer: CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Question: A(n) ______ demands payment to stop an attack.

Answer: cyberextortionist

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.