Deck 47: Internet Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/36
Play
Full screen (f)
Deck 47: Internet Security
1
An IP address identifies you by name as a user on the Internet.
False
2
Spyware,viruses,and worms are all forms of adware.
False
3
An identity thief could steal your credit card number by using a special device when processing your card.
True
4
In a practice called ____,someone may manipulate people into performing actions or divulging confidential information on the Internet.
A) worm hunting
B) social engineering
C) packet sniffing
D) port scanning
A) worm hunting
B) social engineering
C) packet sniffing
D) port scanning
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
5
In the criminal act of pharming,hackers hijack a Domain Name Server to automatically redirect users from legitimate websites to spoofed websites in an effort to steal personal information.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is one realistic way to promote Internet security?
A) Avoid client/server networks.
B) Do not automatically update your operating system.
C) Select strong passwords and change them regularly.
D) Avoid the use of email altogether.
A) Avoid client/server networks.
B) Do not automatically update your operating system.
C) Select strong passwords and change them regularly.
D) Avoid the use of email altogether.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
7
Countries are working together to agree upon international laws that will monitor cybercrime.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
8
Malware is sometimes spread through music-sharing P2P networks.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
9
Once installed,antivirus software is effective for the life of the computer.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
10
Fighting international cyber attacks is possible with the help of black-hat hackers.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
11
The Consumer Internet Privacy Protection Act of 1997 requires businesses to contact customers when their personal information is compromised.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
12
A digital certificate is also sometimes called an SSL certificate.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
13
A company may hire a ____ hacker to learn about vulnerabilities in its system.
A) black-hat
B) white-hat
C) gray-hat
D) red-hat
A) black-hat
B) white-hat
C) gray-hat
D) red-hat
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
14
A software patch is sometimes called a security patch.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
15
One popular hacking tool is key-logging software.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
16
A zombie computer helps fight against intrusions by hackers.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
17
An unsolicited email requesting information to complete a loan application is most likely an example of Internet fraud.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
18
Website ranching is used by scammers to collect personal information from a user.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
19
A firewall is network hardware or software that examines data packets flowing into and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
20
Impersonating legitimate businesses on the web or in email is referred to as phaking.
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
21
Receiving a fraudulent email that closely resembles a legitimate website,such as one from your bank,is known as a(n)____ attack.
A) phishing
B) spam
C) scam
D) zombie
A) phishing
B) spam
C) scam
D) zombie
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
A) shareware
B) peer
C) zombie
D) malware
A) shareware
B) peer
C) zombie
D) malware
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
23
A company called ____ provides digital certifications for web transactions.
A) GoDaddy
B) VeriSign
C) Microsoft
D) US-CERT
A) GoDaddy
B) VeriSign
C) Microsoft
D) US-CERT
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
24
Sites such as eBay are a popular target for ____.
A) scripters
B) Internet fraud
C) port-scanning
D) cookies
A) scripters
B) Internet fraud
C) port-scanning
D) cookies
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
25
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
A) key-logging
B) packet-sniffing
C) WAP
D) updates
A) key-logging
B) packet-sniffing
C) WAP
D) updates
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
26
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
A) cookies
B) biometrics
C) port-scanning
D) encryption
A) cookies
B) biometrics
C) port-scanning
D) encryption
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ may be used to filter data that may be undesirable.
A) port sniffer
B) firewall
C) zombie
D) botnet
A) port sniffer
B) firewall
C) zombie
D) botnet
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ allows hackers to gain access to important code or information in a software program.
A) DNS
B) worm
C) security hole
D) firewall
A) DNS
B) worm
C) security hole
D) firewall
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
29
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
A) a worm
B) a MAC filter
C) a Trojan
D) spyware
A) a worm
B) a MAC filter
C) a Trojan
D) spyware
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)____ certificate confirms your credentials when conducting business or other transactions on the web.
A) ISP
B) IP
C) SSL
D) HTTP
A) ISP
B) IP
C) SSL
D) HTTP
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
31
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
A) links
B) ports
C) cables
D) bays
A) links
B) ports
C) cables
D) bays
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
32
All of the following are examples of malware EXCEPT ____.
A) worms
B) viruses
C) spyware
D) updates
A) worms
B) viruses
C) spyware
D) updates
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
33
In a distributed denial-of-service (DDoS)attack,the services of a(n)____ can be halted.
A) hard drive
B) Internet server
C) CPU
D) email client
A) hard drive
B) Internet server
C) CPU
D) email client
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
34
The ____ was established to secure and monitor security risks to U.S.networks and the Internet.
A) NTSB
B) W3C
C) US-CERT
D) NSF
A) NTSB
B) W3C
C) US-CERT
D) NSF
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
35
The https: // protocol in a URL indicates the use of a(n)____ by the website.
A) domain name
B) PCI
C) SSL connection
D) RAID
A) domain name
B) PCI
C) SSL connection
D) RAID
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck
36
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
A) Trojan
B) phishing
C) decryption
D) domain
A) Trojan
B) phishing
C) decryption
D) domain
Unlock Deck
Unlock for access to all 36 flashcards in this deck.
Unlock Deck
k this deck