Professional Documents
Culture Documents
Week9 Quiz
Week9 Quiz
WEEK 9
COVERAGE: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
ANSWER: cracker
A password ______ is a service that stores all of your account information securely.
ANSWER: manager
ANSWER: engineering
A session cookie stores user names and/or passwords so that users do not need to enter this
information every time they sign in to the website.
ANSWER: False
A(n) ______ backup copies only the files that have changed since the last full backup.
ANSWER: differential
ANSWER: False
ANSWER: True
ANSWER: number
Another term for botnet is ______ army.
ANSWER: zombie
ANSWER: False
If your computer's operating system provides a personal firewall, you do not need to disable it if you are
using a third-party firewall.
ANSWER: False
A hand geometry system measures the size and shape of a person's hand.
ANSWER: True
You should disable GPS tracking on your mobile device unless you need to use it.
ANSWER: True
ANSWER: False
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain
action.
ANSWER: lock
The website for CERT/CC provides information about Internet security breaches.
ANSWER: True
ANSWER: cyberextortionist
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the
recipient of the data uses to decrypt.
ANSWER: key
ANSWER: True
You want to ensure your wireless network is secure. Which of the following should you NOT do?
An organization creates a disaster recovery plan. Which part would include return procedures (who can
enter the facility, and what actions they are to perform)?
ANSWER: CAPTCHAs were developed to verify input is coming from computer programs, not humans.
You realize your computer has been infected with malware. It seems as if someone is controlling your
computer from a remote location. What type of malware might you have?
ANSWER: rootkit
Badges, cards, smart cards, and keys are examples of _____ objects.
ANSWER: possessed
Common digital security risks include information theft and system failure.
ANSWER: True
If the web address of a website begins with https instead of http, what do you know about the website?
ANSWER: It is secure.
A password ______ is a service that stores all of your account information securely.
ANSWER: manager
You realize your computer has been infected with malware. The program has been copying itself
repeatedly, using up resources. What type of malware might you have?
ANSWER: worm
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
ANSWER: always stay connected to the Internet
An iris recognition system uses technology to read patterns in the user's ______.
ANSWER: eye
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or
allowed/not allowed.
ANSWER: code of conduct
An encryption ______ is a set of steps that converts readable text into unreadable text.
ANSWER: encryption