Deck 5: Data Security

Full screen (f)
exit full mode
Question
Spyware gathers personal information, without the victim's knowledge.
Use Space or
up arrow
down arrow
to flip the card.
Question
Software failure can be caused by a(n) worm , which is a flaw in the program code or design.
Question
In Safe Mode, you can use the Control Panel to uninstall recently added programs or hardware.
Question
A security suite might include detecting intrusions into your wireless network.
Question
Security experts use the term mixed threat to describe malware that combines more than one type of malicious program.
Question
Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.
Question
A person who controls many computers infested with intelligent agents is called a(n) botmaster .
Question
A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.
Question
A Trojan is designed to replicate itself and spread to other computers.
Question
A(n) password usually can be entered using a numeric keypad.
Question
  Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive.<div style=padding-top: 35px> Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive.
Question
A virus spreads by itself from one computer to another.
Question
A Remote Access Trojan allows hackers to transmit files to victims' computers, search for data, run programs, and use a victim's computer as a relay station for breaking into other computers.
Question
A(n) differential backup makes a backup of the files that were added or changed since the last backup.
Question
Hackers can spread worms over file-sharing networks and instant messaging links.
Question
If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.
Question
Operator error refers to a mistake made by a computer user or programmer.
Question
Cyberterrorism uses viruses and worms to destroy data and disrupt computer-related operations such as power grids and telecommunication systems.
Question
One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.
Question
Even a brief interruption in power can force your computer to lose all data in ROM.
Question
All of the following are good tips for creating secure passwords EXCEPT ____.

A) use a password of at least eight characters
B) use uppercase and lowercase letters
C) do not use public information, such as your phone number
D) use a common word, but spell it backwards
Question
A power ____ is a complete loss of power to the computer system.

A) failure
B) spike
C) surge
D) outage
Question
A keylogger is a(n) ____.

A) password generation program
B) program that secretly records keystrokes and sends the information to a hacker
C) encryption method
D) type of worm
Question
Viruses that deliver their payloads in response to a system event are referred to as ____ bombs.

A) logic
B) time
C) boot sector
D) black hat
Question
A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.

A) worm
B) bug
C) virus
D) Trojan horse
Question
If you encounter the blue screen of death, ____.

A) the computer no longer can accept commands
B) the operating system has a critical error
C) you might need to contact a technical support person
D) All of the above.
Question
A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.

A) zombie
B) bot
C) botmaster
D) RAT
Question
STOP is ____.

A) a plate with a unique ID number
B) a type of encryption
C) an anti-cyberterrorism group
D) a virus protection software program
Question
The objective of ____ management is to help reduce downtime, and maintain the best working conditions.

A) network
B) risk
C) security
D) threat
Question
A ____ is a program that seems to perform one function while actually doing something else.

A) worm
B) bug
C) virus
D) Trojan horse
Question
____ spikes can damage sensitive computer parts.

A) Risk
B) RAT
C) Voltage
D) WPA2
Question
A ____ is a self-copying program that spreads by itself from one computer to another.

A) worm
B) bug
C) virus
D) Trojan horse
Question
____ are rules that limit access to directories and files.

A) Encryption protocols
B) Passwords
C) User rights
D) Authentication protocols
Question
<strong>  The accompanying figure shows an example of a ____.</strong> A) UPS B) surge strip C) ventilation system D) boot disk <div style=padding-top: 35px> The accompanying figure shows an example of a ____.

A) UPS
B) surge strip
C) ventilation system
D) boot disk
Question
All of the following are other terms for user IDs EXCEPT ____.

A) username
B) password
C) online nickname
D) screen name
Question
Black hats and crackers are ____.

A) types of viruses
B) people who LANjack
C) virus protection software programs
D) names for people who create malware
Question
A(n) ____ is software that can automate a task or autonomously execute a task when commanded to do so.

A) zombie
B) intelligent agent
C) botmaster
D) RAT
Question
<strong>  The item in the accompanying figure is used to protect your computer from ____.</strong> A) viruses B) hackers C) power problems D) thieves <div style=padding-top: 35px> The item in the accompanying figure is used to protect your computer from ____.

A) viruses
B) hackers
C) power problems
D) thieves
Question
____ viruses infect the system files your computer uses every time it powers up.

A) Logic
B) Payload
C) Boot sector
D) Black hat
Question
During startup, if your computer's screen remains blank or an error message appears, you may have a ____.

A) network problem
B) bug
C) software problem
D) hardware problem
Question
A virus ____ is a section of program code that can be used to identify a known malicious program.

A) flag
B) signature
C) definition
D) scan
Question
<strong>  The application in the accompanying figure is an example of a program that protects against ____.</strong> A) spyware B) viruses C) phishing D) pharming <div style=padding-top: 35px> The application in the accompanying figure is an example of a program that protects against ____.

A) spyware
B) viruses
C) phishing
D) pharming
Question
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.

A) boot disk
B) recovery CD
C) restore point
D) backup disk
Question
A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.

A) firewall
B) security suite
C) antivirus program
D) antispyware program
Question
Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.

A) firewall
B) authentication
C) concatenation
D) recovery
Question
A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.

A) wireless network key
B) password
C) PIN
D) port key
Question
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.

A) boot disk
B) restore point
C) differential backup
D) incremental backup
Question
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.

A) Mira1980
B) drowssapMira
C) 9785550101
D) Fl0wErch1ld
Question
A good  ____ can be used to scan the Web to assemble data for search engines.

A) zombie
B) spyware program
C) bot
D) RAT
Question
<strong>  The application shown in the accompanying figure is an example of a(n) ____.</strong> A) firewall B) Trojan horse C) encryption program D) security suite <div style=padding-top: 35px> The application shown in the accompanying figure is an example of a(n) ____.

A) firewall
B) Trojan horse
C) encryption program
D) security suite
Question
The information that antivirus software uses to identify and remove malware is referred to as a virus ____.

A) flag
B) signature
C) definition
D) scan
Question
A ____ attack is when hackers intercept information sent out over networks.

A) phishing
B) pharming
C) sniffing
D) spamming
Question
Port scanning software can examine more than ____ computers per minute.

A) 300
B) 3000
C) 30,000
D) 300,000
Question
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.

A) clicking pop-up ads
B) getting software from unknown sources
C) hiding file extensions
D) opening email attachments
Question
____ can encrypt data based on the user's password and implements message integrity checking.

A) WEP
B) WPA
C) Security Suites
D) All of the above.
Question
____ is the practice of intercepting signals with a Wi-Fi enabled notebook.

A) LANjacking
B) War driving
C) Keylogging
D) Both A and B.
Question
____ is an email or IM-based scam designed to persuade you to reveal confidential information.

A) Sniffing
B) Spamming
C) Pharming
D) Phishing
Question
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.

A) boot disk
B) recovery CD
C) restore point
D) backup disk
Question
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that which of the following is NOT true about cookies?

A) Clicking a banner ad can create a cookie that tracks your activities.
B) To avoid risks associated with cookies, you should block them all.
C) Privacy advocates worry that shopper profiles can be sold and used for unauthorized purposes.
D) Several companies offer an opt-out cookie option.
Question
In Safe Mode, you can use all of the following EXCEPT ____.

A) mouse
B) printer
C) screen
D) keyboard
Question
Match between columns
E-mail that leads users to a fake site and asks them to confirm personal information.
Pharming
E-mail that leads users to a fake site and asks them to confirm personal information.
Data diddling
E-mail that leads users to a fake site and asks them to confirm personal information.
Phishing
E-mail that leads users to a fake site and asks them to confirm personal information.
Captcha
E-mail that leads users to a fake site and asks them to confirm personal information.
Dictionary attack
Unauthorized alterations to information, such as changing a student's grades.
Pharming
Unauthorized alterations to information, such as changing a student's grades.
Data diddling
Unauthorized alterations to information, such as changing a student's grades.
Phishing
Unauthorized alterations to information, such as changing a student's grades.
Captcha
Unauthorized alterations to information, such as changing a student's grades.
Dictionary attack
Guessing a password using a list of common passwords.
Pharming
Guessing a password using a list of common passwords.
Data diddling
Guessing a password using a list of common passwords.
Phishing
Guessing a password using a list of common passwords.
Captcha
Guessing a password using a list of common passwords.
Dictionary attack
Poisons a domain name server with a false IP address.
Pharming
Poisons a domain name server with a false IP address.
Data diddling
Poisons a domain name server with a false IP address.
Phishing
Poisons a domain name server with a false IP address.
Captcha
Poisons a domain name server with a false IP address.
Dictionary attack
Displays a combination of letters and numbers that you must type.
Pharming
Displays a combination of letters and numbers that you must type.
Data diddling
Displays a combination of letters and numbers that you must type.
Phishing
Displays a combination of letters and numbers that you must type.
Captcha
Displays a combination of letters and numbers that you must type.
Dictionary attack
Question
A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.
Question
One of the biggest security threats to your computer is the result of malicious code, called ____________________.
Question
A(n) ____________________ spreads when a person distributes an infected file.
Question
Provide 10 tips for keeping your computer system in good working condition.
Question
____________________ management is the process of identifying potential threats, avoiding as many threats as possible, and developing steps to fix whatever went wrong.
Question
An email with a dire warning about a new virus is usually a virus ____________________.
Question
  Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.<div style=padding-top: 35px> Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.
Question
What is malware? List and describe four things that malware can do to your computer.
Question
What are five tips for preventing computer theft?
Question
A(n) ____________________ strip is an appliance designed to protect electrical devices from power problems but that does not contain a battery to keep the computer running.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Data Security
1
Spyware gathers personal information, without the victim's knowledge.
True
2
Software failure can be caused by a(n) worm , which is a flaw in the program code or design.
False
3
In Safe Mode, you can use the Control Panel to uninstall recently added programs or hardware.
True
4
A security suite might include detecting intrusions into your wireless network.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
Security experts use the term mixed threat to describe malware that combines more than one type of malicious program.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Spam is email generated by marketing firms using e-mail addresses from mailing lists, membership applications, and Web sites.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
A person who controls many computers infested with intelligent agents is called a(n) botmaster .
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
A recovery disk contains a complete copy of your computer's hard drive, including your data files and software you installed.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
A Trojan is designed to replicate itself and spread to other computers.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) password usually can be entered using a numeric keypad.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
  Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive. Crackers , like the kind shown in the accompanying figure, are messages containing information about the user sent from a Web server to a browser and stored on the user's hard drive.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
A virus spreads by itself from one computer to another.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
A Remote Access Trojan allows hackers to transmit files to victims' computers, search for data, run programs, and use a victim's computer as a relay station for breaking into other computers.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) differential backup makes a backup of the files that were added or changed since the last backup.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
Hackers can spread worms over file-sharing networks and instant messaging links.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
If a pop-up ad for a security suite opens on your computer, you should click on it to install the software.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
Operator error refers to a mistake made by a computer user or programmer.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
Cyberterrorism uses viruses and worms to destroy data and disrupt computer-related operations such as power grids and telecommunication systems.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
One advantage of using a network server for backup is that you do not need to be connected to the network server in order to backup or retrieve your files.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Even a brief interruption in power can force your computer to lose all data in ROM.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
All of the following are good tips for creating secure passwords EXCEPT ____.

A) use a password of at least eight characters
B) use uppercase and lowercase letters
C) do not use public information, such as your phone number
D) use a common word, but spell it backwards
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
A power ____ is a complete loss of power to the computer system.

A) failure
B) spike
C) surge
D) outage
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
A keylogger is a(n) ____.

A) password generation program
B) program that secretly records keystrokes and sends the information to a hacker
C) encryption method
D) type of worm
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Viruses that deliver their payloads in response to a system event are referred to as ____ bombs.

A) logic
B) time
C) boot sector
D) black hat
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.

A) worm
B) bug
C) virus
D) Trojan horse
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
If you encounter the blue screen of death, ____.

A) the computer no longer can accept commands
B) the operating system has a critical error
C) you might need to contact a technical support person
D) All of the above.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ is a computer that carries out instructions without the knowledge of the computer owner.

A) zombie
B) bot
C) botmaster
D) RAT
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
STOP is ____.

A) a plate with a unique ID number
B) a type of encryption
C) an anti-cyberterrorism group
D) a virus protection software program
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
The objective of ____ management is to help reduce downtime, and maintain the best working conditions.

A) network
B) risk
C) security
D) threat
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ is a program that seems to perform one function while actually doing something else.

A) worm
B) bug
C) virus
D) Trojan horse
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
____ spikes can damage sensitive computer parts.

A) Risk
B) RAT
C) Voltage
D) WPA2
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ is a self-copying program that spreads by itself from one computer to another.

A) worm
B) bug
C) virus
D) Trojan horse
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
____ are rules that limit access to directories and files.

A) Encryption protocols
B) Passwords
C) User rights
D) Authentication protocols
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
<strong>  The accompanying figure shows an example of a ____.</strong> A) UPS B) surge strip C) ventilation system D) boot disk The accompanying figure shows an example of a ____.

A) UPS
B) surge strip
C) ventilation system
D) boot disk
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
All of the following are other terms for user IDs EXCEPT ____.

A) username
B) password
C) online nickname
D) screen name
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Black hats and crackers are ____.

A) types of viruses
B) people who LANjack
C) virus protection software programs
D) names for people who create malware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____ is software that can automate a task or autonomously execute a task when commanded to do so.

A) zombie
B) intelligent agent
C) botmaster
D) RAT
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
<strong>  The item in the accompanying figure is used to protect your computer from ____.</strong> A) viruses B) hackers C) power problems D) thieves The item in the accompanying figure is used to protect your computer from ____.

A) viruses
B) hackers
C) power problems
D) thieves
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
____ viruses infect the system files your computer uses every time it powers up.

A) Logic
B) Payload
C) Boot sector
D) Black hat
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
During startup, if your computer's screen remains blank or an error message appears, you may have a ____.

A) network problem
B) bug
C) software problem
D) hardware problem
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
A virus ____ is a section of program code that can be used to identify a known malicious program.

A) flag
B) signature
C) definition
D) scan
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
<strong>  The application in the accompanying figure is an example of a program that protects against ____.</strong> A) spyware B) viruses C) phishing D) pharming The application in the accompanying figure is an example of a program that protects against ____.

A) spyware
B) viruses
C) phishing
D) pharming
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna uses her Windows installation CD as a ____, because it contains the operating system files needed to boot her computer without accessing the hard drive.

A) boot disk
B) recovery CD
C) restore point
D) backup disk
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.

A) firewall
B) security suite
C) antivirus program
D) antispyware program
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
Internet service providers use e-mail ____ techniques to verify that e-mail messages originate from the Internet domain from which they claim to have been sent.

A) firewall
B) authentication
C) concatenation
D) recovery
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
A ____ is the basis for encrypting and decrypting the data transmitted between wireless devices.

A) wireless network key
B) password
C) PIN
D) port key
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.

A) boot disk
B) restore point
C) differential backup
D) incremental backup
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that ____ is the most secure password for her to choose.

A) Mira1980
B) drowssapMira
C) 9785550101
D) Fl0wErch1ld
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
A good  ____ can be used to scan the Web to assemble data for search engines.

A) zombie
B) spyware program
C) bot
D) RAT
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
<strong>  The application shown in the accompanying figure is an example of a(n) ____.</strong> A) firewall B) Trojan horse C) encryption program D) security suite The application shown in the accompanying figure is an example of a(n) ____.

A) firewall
B) Trojan horse
C) encryption program
D) security suite
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
The information that antivirus software uses to identify and remove malware is referred to as a virus ____.

A) flag
B) signature
C) definition
D) scan
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
A ____ attack is when hackers intercept information sent out over networks.

A) phishing
B) pharming
C) sniffing
D) spamming
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
Port scanning software can examine more than ____ computers per minute.

A) 300
B) 3000
C) 30,000
D) 300,000
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that to avoid malware, she should avoid all of the following EXCEPT ____.

A) clicking pop-up ads
B) getting software from unknown sources
C) hiding file extensions
D) opening email attachments
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
____ can encrypt data based on the user's password and implements message integrity checking.

A) WEP
B) WPA
C) Security Suites
D) All of the above.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
____ is the practice of intercepting signals with a Wi-Fi enabled notebook.

A) LANjacking
B) War driving
C) Keylogging
D) Both A and B.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
____ is an email or IM-based scam designed to persuade you to reveal confidential information.

A) Sniffing
B) Spamming
C) Pharming
D) Phishing
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
Jordanna recently lost a lot of data when a virus attacked her computer system. She is coming up with a backup plan to minimize future data loss. Jordanna knows that a ____ is a bootable disk that contains a complete copy of your computer's hard drive as it existed when shipped from the manufacturer.

A) boot disk
B) recovery CD
C) restore point
D) backup disk
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
Kyle is training a new employee named Mira on how to set up measures to protect the computers and systems in their company. Kyle tells his co-worker Mira that which of the following is NOT true about cookies?

A) Clicking a banner ad can create a cookie that tracks your activities.
B) To avoid risks associated with cookies, you should block them all.
C) Privacy advocates worry that shopper profiles can be sold and used for unauthorized purposes.
D) Several companies offer an opt-out cookie option.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
In Safe Mode, you can use all of the following EXCEPT ____.

A) mouse
B) printer
C) screen
D) keyboard
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
E-mail that leads users to a fake site and asks them to confirm personal information.
Pharming
E-mail that leads users to a fake site and asks them to confirm personal information.
Data diddling
E-mail that leads users to a fake site and asks them to confirm personal information.
Phishing
E-mail that leads users to a fake site and asks them to confirm personal information.
Captcha
E-mail that leads users to a fake site and asks them to confirm personal information.
Dictionary attack
Unauthorized alterations to information, such as changing a student's grades.
Pharming
Unauthorized alterations to information, such as changing a student's grades.
Data diddling
Unauthorized alterations to information, such as changing a student's grades.
Phishing
Unauthorized alterations to information, such as changing a student's grades.
Captcha
Unauthorized alterations to information, such as changing a student's grades.
Dictionary attack
Guessing a password using a list of common passwords.
Pharming
Guessing a password using a list of common passwords.
Data diddling
Guessing a password using a list of common passwords.
Phishing
Guessing a password using a list of common passwords.
Captcha
Guessing a password using a list of common passwords.
Dictionary attack
Poisons a domain name server with a false IP address.
Pharming
Poisons a domain name server with a false IP address.
Data diddling
Poisons a domain name server with a false IP address.
Phishing
Poisons a domain name server with a false IP address.
Captcha
Poisons a domain name server with a false IP address.
Dictionary attack
Displays a combination of letters and numbers that you must type.
Pharming
Displays a combination of letters and numbers that you must type.
Data diddling
Displays a combination of letters and numbers that you must type.
Phishing
Displays a combination of letters and numbers that you must type.
Captcha
Displays a combination of letters and numbers that you must type.
Dictionary attack
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ____________________ probe is the use of automated software to locate computers that are vulnerable to unauthorized access.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
One of the biggest security threats to your computer is the result of malicious code, called ____________________.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) ____________________ spreads when a person distributes an infected file.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
Provide 10 tips for keeping your computer system in good working condition.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ management is the process of identifying potential threats, avoiding as many threats as possible, and developing steps to fix whatever went wrong.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
An email with a dire warning about a new virus is usually a virus ____________________.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
  Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system. Technology like the kind shown in the accompanying figure is an example of a ____________________ identification system.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
What is malware? List and describe four things that malware can do to your computer.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
What are five tips for preventing computer theft?
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) ____________________ strip is an appliance designed to protect electrical devices from power problems but that does not contain a battery to keep the computer running.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 71 flashcards in this deck.