Deck 9: Network and Internet Security

ملء الشاشة (f)
exit full mode
سؤال
It is important to select strong passwords and change them frequently.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
سؤال
Like a computer virus, a computer worm infects other computer files to replicate itself.
سؤال
A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.
سؤال
Private key encryption is also called symmetric key encryption.
سؤال
Biometric authentication uses information that an individual should know or can easily remember.
سؤال
Wi-Fi security features work by default.
سؤال
The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
سؤال
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
سؤال
A relatively new type of scam involves posting fake job listings on job search sites to elicit personal information (such as Social Security numbers) from job seekers.
سؤال
Many Internet security concerns today can be categorized as cybercrimes.
سؤال
Denial of service attacks are usually of insignificant cost in terms of business lost.
سؤال
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
سؤال
Information used in identity theft can be obtained by skimming or via social engineering.
سؤال
Unauthorized use involves using a computer resource for unauthorized activities.
سؤال
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
سؤال
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
سؤال
When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.
سؤال
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
سؤال
Fortunately, identity theft is declining and poses a much smaller danger to individuals today.
سؤال
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there. _________________________
سؤال
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

A) spoofing
B) phishing
C) spamming
D) war driving
سؤال
Strong passwords are passwords that are at least eight characters long. _________________________
سؤال
____ refers to the act of breaking into a computer or network.

A) Spamming
B) Phishing
C) Hacking
D) Spoofing
سؤال
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer. _________________________
سؤال
In spoofing, terrorists launch attacks via the Internet. _________________________
سؤال
Cuts or other changes to a finger may prevent access via a(n) keystroke reader. _________________________
سؤال
Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
سؤال
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with. _________________________
سؤال
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used. _________________________
سؤال
According to a recent study, the total cost per data breach in ____ is $5.4 million-the highest of any country.

A) India
B) China
C) Russia
D) the United States
سؤال
A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer. _________________________
سؤال
Packetsniffing systems determine whether or not the person attempting access is actually who he or she claims to be. _________________________
سؤال
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. _________________________
سؤال
AntiDoS software is used to detect and eliminate computer viruses and other types of malware. _________________________
سؤال
Computer spyware includes any illegal act involving a computer. _________________________
سؤال
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) cybercrime protocols
B) codes of conduct
C) anithacking rules
D) school rules
سؤال
Numeric passwords are referred to passcodes. _________________________
سؤال
Computer crime is sometimes referred to as ____.

A) hacking
B) cybercrime
C) cyberstalking
D) spoofing
سؤال
USB security keys are also called USB security tokens. _________________________
سؤال
____ uses a single secret key to both encrypt and decrypt the file or message.

A) Private key encryption
B) Asymmetric key encryption
C) Public key encryption
D) Synchronous key encryption
سؤال
____ identify users by a particular unique biological characteristic.

A) Possessed object access systems
B) Password access systems
C) Possessed knowledge access systems
D) Biometric access systems
سؤال
Like a computer virus, a ____ is a malicious program designed to cause damage.

A) computer worm
B) scam
C) phish
D) computer bug
سؤال
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A) threat definitions
B) viruses
C) fraud tips
D) virus reports
سؤال
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

A) Usernames
B) PINs
C) Passwords
D) Codes
سؤال
____ is a generic term that refers to any type of malicious software.

A) Spamware
B) Malware
C) Spyware
D) Badware
سؤال
____ includes any acts of malicious destruction to a computer or computer resource.

A) Phishing attacks
B) Blocking attacks
C) Computer sabotage
D) Spoofing attacks
سؤال
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A) CryptMail
B) QuietMail
C) HushMail
D) PrivateMail
سؤال
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

A) war driving
B) Wi-Fi piggybacking
C) Wi-Fi worming
D) denial of service
سؤال
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A) e-cons
B) e-scams
C) dot frauds
D) dot cons
سؤال
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) firewall
C) hub
D) bridge
سؤال
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A) virus
B) software
C) worm
D) hacker
سؤال
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A) Touch object
B) Possessed object
C) Two-factor
D) Biometric
سؤال
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A) spider
B) server
C) client
D) bot
سؤال
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

A) botherders
B) botnets
C) passes
D) tokens
سؤال
____ software can control which devices can be connected to an employee's computer.

A) Data-leakage prevention
B) Device authentication
C) Professional firewall
D) Network quarantine
سؤال
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A) laptop private network
B) USB private network
C) tunnel private network
D) virtual private network
سؤال
One emerging type of Trojan horse is called a ____-Access Trojan.

A) Demote
B) Remote
C) Control
D) Hacker
سؤال
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A) Trojan horse
B) computer worm
C) computer insect
D) computer bug
سؤال
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

A) phish
B) virus
C) bot
D) link
سؤال
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A) Data theft
B) Information theft
C) Identity theft
D) Database theft
سؤال
The best protection against many dot cons is ____.

A) contacting your ISP
B) updating the operating system
C) installing an antivirus program
D) common sense
سؤال
A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.
سؤال
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
سؤال
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A) typosquatting
B) spamming
C) DoS attacks
D) identity theft
سؤال
Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.
سؤال
Public key encryption is also called ____________________ encryption.
سؤال
Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.
سؤال
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

A) private
B) public
C) organizational
D) token
سؤال
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
سؤال
  A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.<div style=padding-top: 35px>
A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
سؤال
A(n) ____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
سؤال
Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
سؤال
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A) Framing
B) Fishing
C) Pharming
D) Farming
سؤال
Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.
سؤال
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A) Heath Insurance Portability and Accountability Act (HIPAA)
B) PROTECT Act
C) Homeland Security Act of 2002
D) National Information Infrastructure Protection Act
سؤال
Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long) is considered ____________________.
سؤال
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n) ____________________.
سؤال
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

A) Spams
B) Identity theft
C) Remote access
D) Software theft
سؤال
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A) EV B) SK C) SQL D) HTTPS <div style=padding-top: 35px>
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A) EV
B) SK
C) SQL
D) HTTPS
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Network and Internet Security
1
It is important to select strong passwords and change them frequently.
True
2
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
False
3
Like a computer virus, a computer worm infects other computer files to replicate itself.
False
4
A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
5
Private key encryption is also called symmetric key encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
6
Biometric authentication uses information that an individual should know or can easily remember.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
7
Wi-Fi security features work by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
9
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
10
A relatively new type of scam involves posting fake job listings on job search sites to elicit personal information (such as Social Security numbers) from job seekers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
11
Many Internet security concerns today can be categorized as cybercrimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
12
Denial of service attacks are usually of insignificant cost in terms of business lost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
13
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
14
Information used in identity theft can be obtained by skimming or via social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
15
Unauthorized use involves using a computer resource for unauthorized activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
16
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
17
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
18
When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
19
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
20
Fortunately, identity theft is declining and poses a much smaller danger to individuals today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
21
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
22
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

A) spoofing
B) phishing
C) spamming
D) war driving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
23
Strong passwords are passwords that are at least eight characters long. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
24
____ refers to the act of breaking into a computer or network.

A) Spamming
B) Phishing
C) Hacking
D) Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
25
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
26
In spoofing, terrorists launch attacks via the Internet. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
27
Cuts or other changes to a finger may prevent access via a(n) keystroke reader. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
28
Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
29
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
30
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
31
According to a recent study, the total cost per data breach in ____ is $5.4 million-the highest of any country.

A) India
B) China
C) Russia
D) the United States
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
33
Packetsniffing systems determine whether or not the person attempting access is actually who he or she claims to be. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
34
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
35
AntiDoS software is used to detect and eliminate computer viruses and other types of malware. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
36
Computer spyware includes any illegal act involving a computer. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
37
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) cybercrime protocols
B) codes of conduct
C) anithacking rules
D) school rules
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
38
Numeric passwords are referred to passcodes. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
39
Computer crime is sometimes referred to as ____.

A) hacking
B) cybercrime
C) cyberstalking
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
40
USB security keys are also called USB security tokens. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
41
____ uses a single secret key to both encrypt and decrypt the file or message.

A) Private key encryption
B) Asymmetric key encryption
C) Public key encryption
D) Synchronous key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
42
____ identify users by a particular unique biological characteristic.

A) Possessed object access systems
B) Password access systems
C) Possessed knowledge access systems
D) Biometric access systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
43
Like a computer virus, a ____ is a malicious program designed to cause damage.

A) computer worm
B) scam
C) phish
D) computer bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
44
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A) threat definitions
B) viruses
C) fraud tips
D) virus reports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
45
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

A) Usernames
B) PINs
C) Passwords
D) Codes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
46
____ is a generic term that refers to any type of malicious software.

A) Spamware
B) Malware
C) Spyware
D) Badware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ includes any acts of malicious destruction to a computer or computer resource.

A) Phishing attacks
B) Blocking attacks
C) Computer sabotage
D) Spoofing attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
48
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A) CryptMail
B) QuietMail
C) HushMail
D) PrivateMail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
49
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

A) war driving
B) Wi-Fi piggybacking
C) Wi-Fi worming
D) denial of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
50
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A) e-cons
B) e-scams
C) dot frauds
D) dot cons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
51
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) firewall
C) hub
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
52
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A) virus
B) software
C) worm
D) hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A) Touch object
B) Possessed object
C) Two-factor
D) Biometric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
54
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A) spider
B) server
C) client
D) bot
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
55
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

A) botherders
B) botnets
C) passes
D) tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ software can control which devices can be connected to an employee's computer.

A) Data-leakage prevention
B) Device authentication
C) Professional firewall
D) Network quarantine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
57
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A) laptop private network
B) USB private network
C) tunnel private network
D) virtual private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
58
One emerging type of Trojan horse is called a ____-Access Trojan.

A) Demote
B) Remote
C) Control
D) Hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
59
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A) Trojan horse
B) computer worm
C) computer insect
D) computer bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
60
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

A) phish
B) virus
C) bot
D) link
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
61
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A) Data theft
B) Information theft
C) Identity theft
D) Database theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
62
The best protection against many dot cons is ____.

A) contacting your ISP
B) updating the operating system
C) installing an antivirus program
D) common sense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
63
A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
64
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
65
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A) typosquatting
B) spamming
C) DoS attacks
D) identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
66
Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
67
Public key encryption is also called ____________________ encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
68
Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
69
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

A) private
B) public
C) organizational
D) token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
70
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
71
  A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
72
A(n) ____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
73
Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
74
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A) Framing
B) Fishing
C) Pharming
D) Farming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
75
Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
76
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A) Heath Insurance Portability and Accountability Act (HIPAA)
B) PROTECT Act
C) Homeland Security Act of 2002
D) National Information Infrastructure Protection Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
77
Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long) is considered ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
78
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
79
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

A) Spams
B) Identity theft
C) Remote access
D) Software theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
80
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A) EV B) SK C) SQL D) HTTPS
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A) EV
B) SK
C) SQL
D) HTTPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 90 في هذه المجموعة.