Deck 17: Computer Security

Full screen (f)
exit full mode
Question
Which of the following malware programs embeds a copy of itself in another program?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
Use Space or
up arrow
down arrow
to flip the card.
Question
A Caesar cipher that shifts characters 4 positions to the right would encode the word LADDER as which of the following?

A) PEHHIV
B) ERLADD
C) DDALRE
D) TSNNQY
Question
Which of the following cryptography techniques requires two separate keys to encrypt and decrypt messages?

A) Caesar cipher
B) Public-key encryption
C) Transposition cipher
D) Electronic signature
Question
Which of the following is not used for user authentication?

A) What the user has
B) What the user knows
C) What the user sees
D) What the user is
Question
Which of the following ensures that data can be modified only by appropriate mechanisms?

A) Integrity
B) Confidentiality
C) Redundancy
D) Availability
Question
Which of the following is the degree to which authorized users can access information for legitimate purposes?

A) Integrity
B) Confidentiality
C) Redundancy
D) Availability
Question
Which of the following security attacks exploits a flaw in a program that could cause a system to crash and leave the user with increased authority levels?

A) Phishing
B) Back door
C) Buffer overflow
D) Denial of service
Question
Which of the following is an example of biometrics?

A) A CAPTCHA phrase
B) Fingerprint analysis
C) An electronic signature
D) Digital certificate
Question
A digital signature is a way to "sign" a document such that the recipient can verify that it came from the originator and has not been altered during transmission.
Question
A digital certificate is an authenticated public key kept for trusted sources in order to minimize forgeries.
Question
A password should never be sent in an email message.
Question
A Caesar cipher that shifts characters 3 to the right would produce the same codes as one that shifts them 23 to the left.
Question
Public-key cryptography and transposition ciphers are examples of modern computer encryption.
Question
What is a logic bomb?
Question
In terms of information security, what is risk analysis?
Question
What is WikiLeaks? What is the controversy surrounding their stated purpose?
Question
How does a transposition cipher work? Is it effective?
Question
What are the two ways antivirus software detects malicious code?
Question
What are some of the reasons a person makes mistakes when it comes to keeping their online information secure?
Question
Which of the following is not part of information security risk analysis?

A) Determining which data need protecting
B) Backing up the data
C) Identifying the risks to the data
D) Calculating the likelihood that a risk may become a reality
Question
Which of the following is the least likely consequence if the process of user authentication is compromised?

A) Abuse of user's private information
B) Communications falsely attributed to user
C) Loss of user's access to account
D) Proceeds from Spanish lottery deposited in user's bank account
Question
Which of the following malware programs is disguised as a benevolent program?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
Question
A Caesar cipher that shifts characters 3 positions to the right would encode the word BUBBLE as which of the following?

A) BLEBUB
B) YRYYIB
C) EXEEOH
D) ELBBUB
Question
Which feature of a cell phone has been in the news because it is being exploited by some organizations to collect data about the user?

A) Recent call lists
B) Cameras
C) GPS capabilities
D) Directory lists
Question
Which of the following security attacks collects key information, like your password, by using a fake web page?

A) Phishing
B) Back door
C) Buffer overflow
D) Denial of service
Question
Because good passwords are hard to remember, users should memorize just a few and use them for all of their accounts.
Question
Malware known as a Trojan horse uses a system-oriented event to determine when it launches its attack.
Question
The companies that make antivirus software are constantly updating their databases of signatures and heuristics to detect new malware.
Question
Cryptanalysis is the process of "breaking" a cryptographic code.
Question
A transposition cipher substitutes one character with another.
Question
A digital signature is a way to "sign" a document by appending extra data that are both unique to the sender and very difficult to forge.
Question
Phishing is a technique that uses a fake web page to collect information such as usernames and passwords.
Question
A username is not sufficient for user authentication.
Question
Information security experts embrace the principle that no single individual should have the authority to have a significant impact on the system.
Question
Which of the following is not a reasonable password management guideline?

A) Use a combination of uppercase and lowercase letters in your password.
B) Never tell anyone your password.
C) Do not use the same password for multiple accounts.
D) Use a password that is easy for you to remember, like your dog's name.
Question
Which of the following is the least significant challenge in the use of fingerprint analysis for user authentication?

A) Potential for false acceptance
B) Potential for false rejection
C) Relatively high cost
D) User complaints about inconvenience
Question
Which of the following malware programs might launch its attack on the next April Fool's Day?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
Question
A route cipher is an example of what category of encryption?

A) Caesar cipher
B) Public-key encryption
C) Transposition cipher
D) Electronic signature
Question
According to a 2018 report, what percentage of cyber-attacks target small businesses?

A) 5%
B) 12%
C) 25%
D) 43%
Question
Which of the following are not user authentication credentials?

A) Smart cards
B) CAPTCHA phrases
C) Passwords
D) Fingerprints
Question
Password management software should be evaluated and used with care, but may provide a good solution for the active user.
Question
Antivirus software is only effective against viruses.
Question
Encryption is the process of converting plaintext into ciphertext.
Question
The requirement that the sender and receiver must share the cipher key is a major drawback of public-key cryptography.
Question
A wiki is a web site whose goal is to disseminate secret and classified information to the public.
Question
WikiLeaks is a wiki.
Question
Users should beware of any situation in which they are contacted and requested to provide security information.
Question
A computer virus and a computer worm are both self-replicating programs.
Question
GPS and other location data available on cell phones are sometimes collected by corporate agencies and/or used by law enforcement to aid criminal investigations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Computer Security
1
Which of the following malware programs embeds a copy of itself in another program?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
A
2
A Caesar cipher that shifts characters 4 positions to the right would encode the word LADDER as which of the following?

A) PEHHIV
B) ERLADD
C) DDALRE
D) TSNNQY
A
3
Which of the following cryptography techniques requires two separate keys to encrypt and decrypt messages?

A) Caesar cipher
B) Public-key encryption
C) Transposition cipher
D) Electronic signature
B
4
Which of the following is not used for user authentication?

A) What the user has
B) What the user knows
C) What the user sees
D) What the user is
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following ensures that data can be modified only by appropriate mechanisms?

A) Integrity
B) Confidentiality
C) Redundancy
D) Availability
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is the degree to which authorized users can access information for legitimate purposes?

A) Integrity
B) Confidentiality
C) Redundancy
D) Availability
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following security attacks exploits a flaw in a program that could cause a system to crash and leave the user with increased authority levels?

A) Phishing
B) Back door
C) Buffer overflow
D) Denial of service
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is an example of biometrics?

A) A CAPTCHA phrase
B) Fingerprint analysis
C) An electronic signature
D) Digital certificate
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
A digital signature is a way to "sign" a document such that the recipient can verify that it came from the originator and has not been altered during transmission.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
A digital certificate is an authenticated public key kept for trusted sources in order to minimize forgeries.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
A password should never be sent in an email message.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
A Caesar cipher that shifts characters 3 to the right would produce the same codes as one that shifts them 23 to the left.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
Public-key cryptography and transposition ciphers are examples of modern computer encryption.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
What is a logic bomb?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
In terms of information security, what is risk analysis?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
What is WikiLeaks? What is the controversy surrounding their stated purpose?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
How does a transposition cipher work? Is it effective?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
What are the two ways antivirus software detects malicious code?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
What are some of the reasons a person makes mistakes when it comes to keeping their online information secure?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not part of information security risk analysis?

A) Determining which data need protecting
B) Backing up the data
C) Identifying the risks to the data
D) Calculating the likelihood that a risk may become a reality
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is the least likely consequence if the process of user authentication is compromised?

A) Abuse of user's private information
B) Communications falsely attributed to user
C) Loss of user's access to account
D) Proceeds from Spanish lottery deposited in user's bank account
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following malware programs is disguised as a benevolent program?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
A Caesar cipher that shifts characters 3 positions to the right would encode the word BUBBLE as which of the following?

A) BLEBUB
B) YRYYIB
C) EXEEOH
D) ELBBUB
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Which feature of a cell phone has been in the news because it is being exploited by some organizations to collect data about the user?

A) Recent call lists
B) Cameras
C) GPS capabilities
D) Directory lists
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following security attacks collects key information, like your password, by using a fake web page?

A) Phishing
B) Back door
C) Buffer overflow
D) Denial of service
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Because good passwords are hard to remember, users should memorize just a few and use them for all of their accounts.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Malware known as a Trojan horse uses a system-oriented event to determine when it launches its attack.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
The companies that make antivirus software are constantly updating their databases of signatures and heuristics to detect new malware.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
Cryptanalysis is the process of "breaking" a cryptographic code.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
A transposition cipher substitutes one character with another.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
A digital signature is a way to "sign" a document by appending extra data that are both unique to the sender and very difficult to forge.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Phishing is a technique that uses a fake web page to collect information such as usernames and passwords.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
A username is not sufficient for user authentication.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Information security experts embrace the principle that no single individual should have the authority to have a significant impact on the system.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is not a reasonable password management guideline?

A) Use a combination of uppercase and lowercase letters in your password.
B) Never tell anyone your password.
C) Do not use the same password for multiple accounts.
D) Use a password that is easy for you to remember, like your dog's name.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is the least significant challenge in the use of fingerprint analysis for user authentication?

A) Potential for false acceptance
B) Potential for false rejection
C) Relatively high cost
D) User complaints about inconvenience
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following malware programs might launch its attack on the next April Fool's Day?

A) Virus
B) Worm
C) Trojan horse
D) Logic bomb
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
A route cipher is an example of what category of encryption?

A) Caesar cipher
B) Public-key encryption
C) Transposition cipher
D) Electronic signature
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
According to a 2018 report, what percentage of cyber-attacks target small businesses?

A) 5%
B) 12%
C) 25%
D) 43%
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following are not user authentication credentials?

A) Smart cards
B) CAPTCHA phrases
C) Passwords
D) Fingerprints
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Password management software should be evaluated and used with care, but may provide a good solution for the active user.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Antivirus software is only effective against viruses.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Encryption is the process of converting plaintext into ciphertext.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
The requirement that the sender and receiver must share the cipher key is a major drawback of public-key cryptography.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
A wiki is a web site whose goal is to disseminate secret and classified information to the public.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
WikiLeaks is a wiki.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Users should beware of any situation in which they are contacted and requested to provide security information.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
A computer virus and a computer worm are both self-replicating programs.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
GPS and other location data available on cell phones are sometimes collected by corporate agencies and/or used by law enforcement to aid criminal investigations.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.