Deck 6: Security and Privacy

Full screen (f)
exit full mode
Question
Data on Web sites are safe from hackers.
Use Space or
up arrow
down arrow
to flip the card.
Question
Denial of service attacks today are often directed toward popular or controversial sites and typically are carried out via multiple computers. This is known as a concentrated denial of service attack.
Question
One of the most important components of security software is recovery software, which protects against computer viruses and other types of malware.
Question
Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software.
Question
_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature.

A)Two-factor authentication
B)Mono authentication
C)Two-factor encryption
D)Mono encryption
Question
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data.
Question
Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.
Question
The purpose of a digital certificate is to authenticate the identity of an individual or organization.
Question
An employee using an office computer to check personal emails is an example of _____.

A)fair use
B)unauthorized use
C)legitimate access
D)hacking
Question
Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.
Question
​ According to a report by security company Websense, more than half of the Web sites classified as malicious are actually legitimate Web sites that have been compromised.
Question
The best protection against many dot cons is to protect any identifying information about oneself that could be used in fraudulent activities.
Question
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

A)hotspots
B)encryption
C)wireframes
D)viewports
Question
Social networking sites have privacy features that can be used to protect the private information of their members.
Question
A _____ requires the person requesting access to provide information that only an authorized user is supposed to know.

A)possessed entity access system
B)possessed conferral access system
C)possessed knowledge access system
D)possessed object access system
Question
Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs.
Question
A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A)botnet
B)worm
C)firewall
D)Trojan horse
Question
​ According to the FBI, organized crime organizations in many countries are increasingly turning to computer crime to target millions of potential victims.
Question
Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.

A)accredited entry
B)unauthorized access
C)denial of service
D)legitimate attack
Question
_____ refers to the act of breaking into a computer or network.

A)Authentication
B)Encrypting
C)Authorization
D)Hacking
Question
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.

A)botnet
B)botcon
C)bean bot
D)chat bot
Question
Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.

A)Web site paging
B)Web site alteration
C)Web site optimization
D)Web site hosting
Question
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.

A)Skimmers
B)Feeders
C)Smishers
D)Pharmers
Question
​ A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.

A)hard-drill authentication
B)zip-level authentication
C)two-factor authentication
D)private-key authentication
Question
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

A)data report
B)business report
C)digital signature
D)digital quotient
Question
Two of the most common ways individuals are harassed online are cyberbullying and _____.

A)cyberailing
B)cyberjacking
C)cybersquatting
D)cyberstalking
Question
Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.

A)firewall
B)proxy
C)Trojan horse
D)War horse
Question
The accompanying figure shows the working of a _____.
<strong>The accompanying figure shows the working of a _____.  </strong> A)brute force attack B)denial of service attack C)quick attack D)phishing attack <div style=padding-top: 35px>

A)brute force attack
B)denial of service attack
C)quick attack
D)phishing attack
Question
Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.

A)pharming
B)vishing
C)phishing
D)smishing
Question
_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

A)Cybersailing
B)Cyberstalking
C)Cybersquatting
D)Cyberbonding
Question
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

A)firewall
B)proxy
C)virus
D)digital signature
Question
Sara , the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.

A)uninterruptible encryption
B)full disk encryption
C)default encryption
D)redundant array encryption
Question
_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

A)Vishing
B)Smishing
C)Phishing
D)Pharming
Question
Harvey, a burglar, breaks into a senior security officer's house by tapping a valid NFC cardon to the door's sensor. However, when opens the officer's room, the security system asks for finger print verification. When he places his finger on the sensor, the alarm goes off and he gets caught. Here, the officer has used _____ to protect his room.

A)biometric access system
B)possessed knowledge access system
C)viewport automation control system
D)decryption control system
Question
_____ occurs when an online buyer receives the proper items but falsely claims that they never arrived.

A)Online media hack
B)Online auction fraud
C)Online pharming
D)Online domain poisoning
Question
_____ occurs when someone obtains enough information about a person to be able to masquerade as that person.

A)Pharming
B)Identity theft
C)Phishing
D)Data theft
Question
​ Liz owns an accounting firm in Seattle. Due to a fire, the company experiences fluctuations in its electricity supply. Liz chalks out a plan that identifies who would take charge in case of a disaster. What type of plan has Liz prepared?

A)Digital data plan
B)Risk continuity plan
C)Business continuity plan
D)Operational permeability plan
Question
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information.

A)Vishing
B)Pharming
C)Phishing
D)Smishing
Question
_____ is the complete malfunction of a computer.

A)System failure
B)Shunt malfunction
C)Remote failure
D)System interruption
Question
_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals.

A)Authentication
B)Encryption
C)Authorization
D)Decryption
Question
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke floods his organization's server with multiple requests so that the server can no longer handle genuine requests. This impacts the productivity of the organization. This act of sabotage is called _____.

A) a denial of service attack ​
B)Wi-fi piggybacking
C)war driving
D)a brick breaking attack
Question
_________ includes any illegal act involving a computer.

A)Cybercrime
B)Virtual crime
C)Inchoate crime
D)Cyberobjectivity
Question
The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented.

A)Child Online Protection Act
B)U)S. SAFE WEB Act
C)Do Not Call Implementation Act
D)Homeland Security Act
Question
_________ occurs whenever an individual gains admission to a computer, network, file, or other computing resource without permission.

A)Unauthorized access
B)Network routing
C)Network evasion
D)Unauthorized termination
Question
The _____ regulates how Web sites can collect information from minors and communicate with them.

A)Children's Online Privacy Protection Act
B)Child Online Protection Act
C)Children's Internet Protection Act
D)Child Identity Theft Protection Act
Question
_____ refers to unsolicited email sent to a large group of individuals at one time.

A)Big bot
B)Big data
C)Worm
D)Spam
Question
Lia, a project manager at a reputed firm, wants to schedule a meeting with the top management immediately to discuss a high-priority issue. Lia should use _____ to determine the availability status of the concerned people.

A)server sensors
B)jinni sensors
C)wipe technology
D)presence technology
Question
The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

A)Real WEB ID Act
B)U)S. SAFE WEB Act of 2006
C)Do Not Call Implementation Act
D)PROTECT Act of 2003
Question
Phil decides to sell his personal computer to buy a new laptop, so he deletes all the data on his hard drive. To ensure that the data on his hard drive cannot be recovered using any special software, he _____ the hard drive-overwrites the hard drive several times using a disk erasing software-before the selling the system.

A)wipes
B)encrypts
C)backs up
D)synchronizes
Question
Rosanna has assembled her new personal computer . While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

A)encrypted flash drive
B)surge suppressor
C)ruggedized drive
D)kill switch
Question
Jade has planned to open a new cosmetics shop. Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.

A)government
B)marketing
C)finance
D)property
Question
John has a laptop that has survived many drops over concrete and withstood extreme temperature variations . John's laptop can be categorized as a _____.

A)dainty device
B)ruggedized device
C)feeble device
D)flimsy device
Question
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug accesses his friend Sasha's Facebook account without her knowledge and sends a message that contains a phishing link to her friends on Facebook. This is a case of _____.

A)a denial of service attack
B)system piggybacking
C)social war driving
D)social media hacking
Question
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.

A)phishing
B)piggybacking
C)war driving
D)social media hacking
Question
The accompanying figure shows the working of _____ .
<strong>The accompanying figure shows the working of _____ .  </strong> A)electronic profiling B)big data C)a surge suppressor D)a data encryptor <div style=padding-top: 35px>

A)electronic profiling
B)big data
C)a surge suppressor
D)a data encryptor
Question
Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop. Therefore, she decides to install closed-circuit security cameras in her shop to prevent future robberies. Identify the technology Helen has used.

A)Video surveillance
B)Presence technology
C)Image recognition
D)Burglar alarm system
Question
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____.

A)war driving
B)data piggybacking
C)a distributed denial of service attack
D)a brick encryption attack
Question
Suzy loses her smartphone in a concert. She uses a software to remotely erase all the data on her device. She also sends an alarm signal to her device through the software. Identify the software that Suzy has used .

A)Hot potato
B)Panic ware
C)Thin ice
D)Kill switch
Question
The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A)Computer Fraud and Abuse Act
B)U)S. SAFE WEB Act
C)Homeland Security Act
D)American Recovery and Reinvestment Act
Question
_____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others.

A)Wiping
B)Opting in
C)Opting out
D)Spamming
Question
Harassment others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as _________.

A)cyberbullying
B)cybersquatting
C)net spoofing
D)larceny spoofing
Question
List some common precautions that can reduce the chance of a serious personal safety problem occurring due to online activities.
Question
Collecting in-depth information about an individual is known as _________.

A)electronic profiling
B)contact skimming
C)information phishing
D)data marketing
Question
_________ involves terrorists launching attacks via the Internet.

A)Cyberterrorism
B)Virtual terrorism
C)Digital terrorism
D)Socioterrorism
Question
Discuss spamming with relevant examples.
Question
_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.

A)War driving
B)Wi-Fi piggybacking
C)Cyber steering
D)Virtual sponging
Question
_________ occurs when phishing emails are targeted to a specific individual and appear to come from an organization or person that the targeted individual has an association with.

A)Spear phishing
B)DNS phishing
C)Individual phishing
D)Associated phishing
Question
_________ is the act of recording or observing the actions of people on the job.

A)Employee monitoring
B)Employee tagging
C)Employee grouping
D)Employee validating
Question
_________ is the theft of information located on or being sent from a computer or other device.

A)Data theft
B)Identity theft
C)Character theft
D)Cyber theft
Question
A hacker modifying a Web site to display an official looking message that informs the user that a particular software program must be downloaded to use the site is an example of _________.

A)Web site alteration
B)Web site proliferation
C)Web site phishing
D)Web site driving
Question
Discuss in detail about phishing and pharming with relevant examples.
Question
To protect a computer from damage due to power fluctuations, a _________ can be used whenever the computer is plugged into a power outlet.

A)surge suppressor
B)power controller
C)surge switcher
D)power regulator
Question
_________ is accessing someone else's unsecured Wi-Fi network from the hacker's current location without authorization.

A)Wi-Fi piggybacking
B)Wi-Fi wardriving
C)Wi-Fi cyberterrorism
D)Wi-Fi maneuvering
Question
_________ is the use of two different access control methods to validate a user.

A)Two-factor authentication
B)Two-factor pattern control
C)Two-factor authorization
D)Two-factor access arrangement
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Security and Privacy
1
Data on Web sites are safe from hackers.
False
2
Denial of service attacks today are often directed toward popular or controversial sites and typically are carried out via multiple computers. This is known as a concentrated denial of service attack.
False
3
One of the most important components of security software is recovery software, which protects against computer viruses and other types of malware.
False
4
Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature.

A)Two-factor authentication
B)Mono authentication
C)Two-factor encryption
D)Mono encryption
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
The purpose of a digital certificate is to authenticate the identity of an individual or organization.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
An employee using an office computer to check personal emails is an example of _____.

A)fair use
B)unauthorized use
C)legitimate access
D)hacking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
​ According to a report by security company Websense, more than half of the Web sites classified as malicious are actually legitimate Web sites that have been compromised.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
The best protection against many dot cons is to protect any identifying information about oneself that could be used in fraudulent activities.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

A)hotspots
B)encryption
C)wireframes
D)viewports
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
Social networking sites have privacy features that can be used to protect the private information of their members.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
A _____ requires the person requesting access to provide information that only an authorized user is supposed to know.

A)possessed entity access system
B)possessed conferral access system
C)possessed knowledge access system
D)possessed object access system
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A)botnet
B)worm
C)firewall
D)Trojan horse
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
​ According to the FBI, organized crime organizations in many countries are increasingly turning to computer crime to target millions of potential victims.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.

A)accredited entry
B)unauthorized access
C)denial of service
D)legitimate attack
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
_____ refers to the act of breaking into a computer or network.

A)Authentication
B)Encrypting
C)Authorization
D)Hacking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.

A)botnet
B)botcon
C)bean bot
D)chat bot
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.

A)Web site paging
B)Web site alteration
C)Web site optimization
D)Web site hosting
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.

A)Skimmers
B)Feeders
C)Smishers
D)Pharmers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
​ A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.

A)hard-drill authentication
B)zip-level authentication
C)two-factor authentication
D)private-key authentication
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

A)data report
B)business report
C)digital signature
D)digital quotient
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
Two of the most common ways individuals are harassed online are cyberbullying and _____.

A)cyberailing
B)cyberjacking
C)cybersquatting
D)cyberstalking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.

A)firewall
B)proxy
C)Trojan horse
D)War horse
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
The accompanying figure shows the working of a _____.
<strong>The accompanying figure shows the working of a _____.  </strong> A)brute force attack B)denial of service attack C)quick attack D)phishing attack

A)brute force attack
B)denial of service attack
C)quick attack
D)phishing attack
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.

A)pharming
B)vishing
C)phishing
D)smishing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

A)Cybersailing
B)Cyberstalking
C)Cybersquatting
D)Cyberbonding
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

A)firewall
B)proxy
C)virus
D)digital signature
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
Sara , the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.

A)uninterruptible encryption
B)full disk encryption
C)default encryption
D)redundant array encryption
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

A)Vishing
B)Smishing
C)Phishing
D)Pharming
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
Harvey, a burglar, breaks into a senior security officer's house by tapping a valid NFC cardon to the door's sensor. However, when opens the officer's room, the security system asks for finger print verification. When he places his finger on the sensor, the alarm goes off and he gets caught. Here, the officer has used _____ to protect his room.

A)biometric access system
B)possessed knowledge access system
C)viewport automation control system
D)decryption control system
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
_____ occurs when an online buyer receives the proper items but falsely claims that they never arrived.

A)Online media hack
B)Online auction fraud
C)Online pharming
D)Online domain poisoning
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
_____ occurs when someone obtains enough information about a person to be able to masquerade as that person.

A)Pharming
B)Identity theft
C)Phishing
D)Data theft
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
​ Liz owns an accounting firm in Seattle. Due to a fire, the company experiences fluctuations in its electricity supply. Liz chalks out a plan that identifies who would take charge in case of a disaster. What type of plan has Liz prepared?

A)Digital data plan
B)Risk continuity plan
C)Business continuity plan
D)Operational permeability plan
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information.

A)Vishing
B)Pharming
C)Phishing
D)Smishing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
_____ is the complete malfunction of a computer.

A)System failure
B)Shunt malfunction
C)Remote failure
D)System interruption
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals.

A)Authentication
B)Encryption
C)Authorization
D)Decryption
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke floods his organization's server with multiple requests so that the server can no longer handle genuine requests. This impacts the productivity of the organization. This act of sabotage is called _____.

A) a denial of service attack ​
B)Wi-fi piggybacking
C)war driving
D)a brick breaking attack
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
_________ includes any illegal act involving a computer.

A)Cybercrime
B)Virtual crime
C)Inchoate crime
D)Cyberobjectivity
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented.

A)Child Online Protection Act
B)U)S. SAFE WEB Act
C)Do Not Call Implementation Act
D)Homeland Security Act
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
_________ occurs whenever an individual gains admission to a computer, network, file, or other computing resource without permission.

A)Unauthorized access
B)Network routing
C)Network evasion
D)Unauthorized termination
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
The _____ regulates how Web sites can collect information from minors and communicate with them.

A)Children's Online Privacy Protection Act
B)Child Online Protection Act
C)Children's Internet Protection Act
D)Child Identity Theft Protection Act
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
_____ refers to unsolicited email sent to a large group of individuals at one time.

A)Big bot
B)Big data
C)Worm
D)Spam
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
Lia, a project manager at a reputed firm, wants to schedule a meeting with the top management immediately to discuss a high-priority issue. Lia should use _____ to determine the availability status of the concerned people.

A)server sensors
B)jinni sensors
C)wipe technology
D)presence technology
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

A)Real WEB ID Act
B)U)S. SAFE WEB Act of 2006
C)Do Not Call Implementation Act
D)PROTECT Act of 2003
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
Phil decides to sell his personal computer to buy a new laptop, so he deletes all the data on his hard drive. To ensure that the data on his hard drive cannot be recovered using any special software, he _____ the hard drive-overwrites the hard drive several times using a disk erasing software-before the selling the system.

A)wipes
B)encrypts
C)backs up
D)synchronizes
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
Rosanna has assembled her new personal computer . While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

A)encrypted flash drive
B)surge suppressor
C)ruggedized drive
D)kill switch
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
Jade has planned to open a new cosmetics shop. Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.

A)government
B)marketing
C)finance
D)property
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
John has a laptop that has survived many drops over concrete and withstood extreme temperature variations . John's laptop can be categorized as a _____.

A)dainty device
B)ruggedized device
C)feeble device
D)flimsy device
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug accesses his friend Sasha's Facebook account without her knowledge and sends a message that contains a phishing link to her friends on Facebook. This is a case of _____.

A)a denial of service attack
B)system piggybacking
C)social war driving
D)social media hacking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks.
Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.

A)phishing
B)piggybacking
C)war driving
D)social media hacking
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
The accompanying figure shows the working of _____ .
<strong>The accompanying figure shows the working of _____ .  </strong> A)electronic profiling B)big data C)a surge suppressor D)a data encryptor

A)electronic profiling
B)big data
C)a surge suppressor
D)a data encryptor
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop. Therefore, she decides to install closed-circuit security cameras in her shop to prevent future robberies. Identify the technology Helen has used.

A)Video surveillance
B)Presence technology
C)Image recognition
D)Burglar alarm system
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____.

A)war driving
B)data piggybacking
C)a distributed denial of service attack
D)a brick encryption attack
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
Suzy loses her smartphone in a concert. She uses a software to remotely erase all the data on her device. She also sends an alarm signal to her device through the software. Identify the software that Suzy has used .

A)Hot potato
B)Panic ware
C)Thin ice
D)Kill switch
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A)Computer Fraud and Abuse Act
B)U)S. SAFE WEB Act
C)Homeland Security Act
D)American Recovery and Reinvestment Act
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
_____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others.

A)Wiping
B)Opting in
C)Opting out
D)Spamming
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
Harassment others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as _________.

A)cyberbullying
B)cybersquatting
C)net spoofing
D)larceny spoofing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
List some common precautions that can reduce the chance of a serious personal safety problem occurring due to online activities.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
Collecting in-depth information about an individual is known as _________.

A)electronic profiling
B)contact skimming
C)information phishing
D)data marketing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
_________ involves terrorists launching attacks via the Internet.

A)Cyberterrorism
B)Virtual terrorism
C)Digital terrorism
D)Socioterrorism
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
Discuss spamming with relevant examples.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.

A)War driving
B)Wi-Fi piggybacking
C)Cyber steering
D)Virtual sponging
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
_________ occurs when phishing emails are targeted to a specific individual and appear to come from an organization or person that the targeted individual has an association with.

A)Spear phishing
B)DNS phishing
C)Individual phishing
D)Associated phishing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
_________ is the act of recording or observing the actions of people on the job.

A)Employee monitoring
B)Employee tagging
C)Employee grouping
D)Employee validating
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
_________ is the theft of information located on or being sent from a computer or other device.

A)Data theft
B)Identity theft
C)Character theft
D)Cyber theft
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
A hacker modifying a Web site to display an official looking message that informs the user that a particular software program must be downloaded to use the site is an example of _________.

A)Web site alteration
B)Web site proliferation
C)Web site phishing
D)Web site driving
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
Discuss in detail about phishing and pharming with relevant examples.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
To protect a computer from damage due to power fluctuations, a _________ can be used whenever the computer is plugged into a power outlet.

A)surge suppressor
B)power controller
C)surge switcher
D)power regulator
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
_________ is accessing someone else's unsecured Wi-Fi network from the hacker's current location without authorization.

A)Wi-Fi piggybacking
B)Wi-Fi wardriving
C)Wi-Fi cyberterrorism
D)Wi-Fi maneuvering
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
_________ is the use of two different access control methods to validate a user.

A)Two-factor authentication
B)Two-factor pattern control
C)Two-factor authorization
D)Two-factor access arrangement
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 74 flashcards in this deck.