Passphrases Are Less Secure Than Passwords.
Question: Passphrases are less secure than passwords.
Answer: FALSE
Question: Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
Answer: TRUE
Question: A rootkit can be a backdoor.
Answer: TRUE
Question: Software used to fight cybercriminals is called crimeware.
Answer: FALSE
Question: The website for CERT/CC provides information about Internet security breaches.
Answer: TRUE
Question: IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Answer: Spoofing
Question: In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.
Answer: Restore
Question: Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.
Answer: forensics
Question: A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.
Answer: site
Question: A(n) ______ is a program that performs a repetitive task on a network.
Answer: bot
Question: Which of the following is NOT a part of a typical single-user license agreement?
Answer: you can rent or lease the software
Question: A(n) ______ often uses prewritten hacking and cracking programs.
Answer: script kiddie
Question: For what purpose was the BSA formed?
Answer: to promote understanding of software privacy
Question: A(n) ______ has a goal of destroying data or stealing information.
Answer: cracker
Question: Another term for botnet is ______ army.
Answer: zombie
Question: Which of the following is not recommended to protect against hardware failure?
Answer: cables and locks
Question: A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
Answer: code of conduct
Question: Malware is short for ______ software.
Answer: malicious
Question: Badges, cards, smart cards, and keys are examples of _____ objects.
Answer: possessed
Question: When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
Answer: distributed
Question: Employers can use firewalls to restrict employees' access to sensitive data.
Answer: TRUE
Question: Intentionally erasing software is not an example of software theft.
Answer: FALSE
Question: If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.
Answer: FALSE
Question: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
Answer: FALSE
Question: Viruses, worms, and trojan horses replicate themselves to other computers or devices.
Answer: FALSE
Question: Which of the following is not a green computing recommendation?
Answer: purchase low-efficiency equipment
Question: PIN stands for personal identification ______.
Answer: number
Question: What does a keygen do?
Answer: Creates software registration numbers.
Question: You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
Answer: worm
Question: An encryption ______ is a set of steps that converts readable text into unreadable text.
Answer: algorithm
Question: Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.
Answer: engineering
Question: An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
Answer: key
Question: Which of the following is NOT a recommended practice for gaming safety?
Answer: look for games that use active X or java script as they are always safe
Question: Which of the following is NOT true about two-step verification?
Answer: When a system sends an authentication code, it typically does not expire.
Question: A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
Answer: lock
Question: A digital ______ is a notice that guarantees a user or website is legitimate.
Answer: certificate
Question: What is an audit trail?
Answer: A file that records access attempts
Question: A password ______ is a service that stores all of your account information securely.
Answer: manager
Question: You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
Answer: rootkit
Question: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.FERPA regulates the confidentiality of ______.
Answer: students educational records
Question: What should an AUP specify?
Answer: The acceptable use of technology by employees for personal reasons
Question: If the web address of a website begins with https instead of http, what do you know about the website?
Answer: it is secure
Question: A(n) ______ verification system compares a person's live speech with their stored speech pattern.
Answer: voice
Question: Fingerprint readers are examples of ______ devices.
Answer: biometric
Question: ______ is the process of converting data that is readable by humans into encoded characters.
Answer: encryption
Question: Two users can have the same email address.
Answer: FALSE
Question: Common digital security risks include information theft and system failure.
Answer: TRUE
Question: A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.
Answer: FALSE
Question: A hand geometry system measures the size and shape of a person's hand.
Answer: TRUE
Question: Piracy is the most common form of software theft.
Answer: TRUE
Question: An access ______ is a security measure that defines who can access a computer, device, or network.
Answer: control
Question: A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
Answer: virus
Question: Which of the following best describes a back door?
Answer: Computer programs used to bypass normal authentication or other security mechanisms in place.
Question: A(n) ______ often uses prewritten hacking and cracking programs.
Answer: script kiddie
Question: An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?
Answer: emergency plan
Question: The term ______ refers to online or Internet-based illegal acts.
Answer: cybercrime
Question: A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.
Answer: password
Question: User IDs are also called user names, log on names, or sign in names.
Answer: username
Question: You should disable GPS tracking on your mobile device unless you need to use it.
Answer: TRUE
Question: Which of the following best describes a single sign on account?
Answer: When you enter your name into one account and you are automatically signed into other accounts and services.
Question: A(n) ______ backup copies only the files that have changed since the last full backup.
Answer: differential
Question: You recently purchased a new laptop for home. You want to ensure that you are safe from malware.You should make sure to do all of the following EXCEPT ______.
Answer: always stay connected to the internet
Question: You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.Which of the following is NOT true about cloud data privacy?
Answer: Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
Question: Public key encryption is also called asymmetric key encryption.
Answer: TRUE
Question: A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.
Answer: passphrase
Question: The destructive event or prank a malware delivers is its ______.
Answer: payload
Question: Which of the following is NOT true about CAPTCHAs?
Answer: CAPTCHAs were developed to verify input is coming from computer programs, not humans.
Question: A(n) ______ demands payment to stop an attack.
Answer: cyberextortionist