Deck 9: Security and Privacy
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 9: Security and Privacy
1
Smartphones are prone to attacks and are known to have OS flaws.
True
2
Read a Web site's piracy rules before providing any personal information.
False
3
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
False
4
Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
There are many options for protecting yourself against computer monitoring by your employer or the government.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Opt-out procedures can be confusing and time consuming, and they do not always work well.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
The primary function of employee monitoring is to track employee productivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Public key encryption is also called asymmetric key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Security software protects devices against malware and other threats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
One advantage of using a biometric access system is its very high accuracy.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
A disaster recovery plan is also called a business continuity plan.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
A government database is a collection of data about people that is collected and maintained by private industry.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Spyware is a possible privacy risk.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Most tracking software do not ____.
A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.
A) security slot
B) system port
C) security opening
D) user lock
A) security slot
B) system port
C) security opening
D) user lock
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
For an even higher level of security than a scheduled backup, presence backup can be used. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
For extended power outages, generators are needed. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Mobile device management software secures and manages the mobile devices used in an organization. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
____ refers to the complete malfunction of a computer system.
A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
A hard drive that uses FDE is often referred to as a(n) ____.
A) full hard drive
B) tracked hard drive
C) spiked hard drive
D) self-encrypting hard drive
A) full hard drive
B) tracked hard drive
C) spiked hard drive
D) self-encrypting hard drive
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Numeric passwords are often called PINs . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Due to the rising number of violent thefts of smartphones in major U.S. cities, cloud locks have been receiving increased attention. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Pharming attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
One of the most obvious types of hardware loss is hardware theft . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
A) mirror
B) hotspot
C) hot file
D) backup
A) mirror
B) hotspot
C) hot file
D) backup
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.
A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.
A) private
B) organizational
C) public
D) token
A) private
B) organizational
C) public
D) token
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Encryption that uses 16-character keys is known as ____ .
A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites .
A) typosquatting
B) spamming
C) decrypting
D) encoding
A) typosquatting
B) spamming
C) decrypting
D) encoding
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
A) War driving
B) Wi-Fi driving
C) Wi-Fi finding
D) E-stalking
A) War driving
B) Wi-Fi driving
C) Wi-Fi finding
D) E-stalking
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
An example of a Wi-Fi security standard is ____.
A) WPA
B) SSL
C) WIP
D) OTP
A) WPA
B) SSL
C) WIP
D) OTP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
A) Trojan horse
B) hub
C) firewall
D) bridge
A) Trojan horse
B) hub
C) firewall
D) bridge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
A) scripts
B) applets
C) file indexes
D) security holes
A) scripts
B) applets
C) file indexes
D) security holes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
____ are designed to withstand much more physical abuse than conventional devices.
A) Secured devices
B) Ruggedized devices
C) Malleable devices
D) Flexible devices
A) Secured devices
B) Ruggedized devices
C) Malleable devices
D) Flexible devices
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
To supplement backup procedures, businesses and other organizations should have a(n) ____.
A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
A fraud or scam carried out through the Internet is a form of ____.
A) e-con
B) dot con
C) dot fraud
D) e-scam
A) e-con
B) dot con
C) dot fraud
D) e-scam
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
____ devices can withstand being dropped or submerged into water.
A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.
A) Framing
B) Pharming
C) Profiling
D) Auctioning
A) Framing
B) Pharming
C) Profiling
D) Auctioning
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Public key encryption utilizes a pair of encryption keys obtained through ____ .
A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
A marketing activity that can be considered a privacy risk is ____.
A) security threads
B) watermarking
C) electronic profiling
D) microprinting
A) security threads
B) watermarking
C) electronic profiling
D) microprinting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
A) buddy site
B) alternate pad
C) hot site
D) white room
A) buddy site
B) alternate pad
C) hot site
D) white room
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Collecting in-depth information about an individual is known as ____.
A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ refers to the act of breaking into a computer or network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
Computer hardware can be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
A) piracy policy
B) security policy
C) identity policy
D) privacy policy
A) piracy policy
B) security policy
C) identity policy
D) privacy policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.
A) CEO
B) CIO
C) CPO
D) CSO
A) CEO
B) CIO
C) CPO
D) CSO
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.
A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
A) firewall
B) anonymous
C) private
D) industrial
A) firewall
B) anonymous
C) private
D) industrial
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.
A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
One common way to deal with spam that makes it to your computer is to use a(n) ____.
A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.
A) opt out
B) disengage
C) build filters
D) block contact
A) opt out
B) disengage
C) build filters
D) block contact
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
A) kill switch
B) throw-away
C) permanent
D) keylogging
A) kill switch
B) throw-away
C) permanent
D) keylogging
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.
A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
A) proximity cards
B) presence technology
C) face recognition
D) video cards
A) proximity cards
B) presence technology
C) face recognition
D) video cards
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.
A) protection history
B) consumer policy
C) privacy record
D) privacy policy
A) protection history
B) consumer policy
C) privacy record
D) privacy policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck