Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

[ITS100] INTRODUCTION TO INFORMATION TECHNOLOGY

WEEK 9
COVERAGE: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

A(n) ______ has a goal of destroying data or stealing information.

ANSWER: cracker

A password ______ is a service that stores all of your account information securely.

ANSWER: manager

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by


taking advantage of another person.

ANSWER: engineering

A session cookie stores user names and/or passwords so that users do not need to enter this
information every time they sign in to the website.

ANSWER: False

A(n) ______ backup copies only the files that have changed since the last full backup.

ANSWER: differential

Software used to fight cybercriminals is called crimeware.

ANSWER: False

Encryption is one safeguard against information theft.

ANSWER: True

PIN stands for personal identification ______.

ANSWER: number
Another term for botnet is ______ army.

ANSWER: zombie

Intentionally erasing software is not an example of software theft.

ANSWER: False

If your computer's operating system provides a personal firewall, you do not need to disable it if you are
using a third-party firewall.

ANSWER: False

A hand geometry system measures the size and shape of a person's hand.

ANSWER: True

You should disable GPS tracking on your mobile device unless you need to use it.

ANSWER: True

Two users can have the same email address.

ANSWER: False

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain
action.

ANSWER: lock

The website for CERT/CC provides information about Internet security breaches.

ANSWER: True

A(n) ______ demands payment to stop an attack.

ANSWER: cyberextortionist
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the
recipient of the data uses to decrypt.

ANSWER: key

A rootkit can be a backdoor.

ANSWER: True

What is an audit trail?

ANSWER: A file that records access attempts

You want to ensure your wireless network is secure. Which of the following should you NOT do?

ANSWER: Broadcast the SSID

An organization creates a disaster recovery plan. Which part would include return procedures (who can
enter the facility, and what actions they are to perform)?

ANSWER: emergency plan

Which of the following is NOT true about CAPTCHAs?

ANSWER: CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Which of the following is NOT true about two-step verification?


ANSWER: When a system sends an authentication code, it typically does not expire.

You realize your computer has been infected with malware. It seems as if someone is controlling your
computer from a remote location. What type of malware might you have?
ANSWER: rootkit

Badges, cards, smart cards, and keys are examples of _____ objects.
ANSWER: possessed
Common digital security risks include information theft and system failure.
ANSWER: True

Which of the following best describes a back door?


ANSWER: A program or set of instructions that allows user to bypass security controls when accessing a
program, computer, or network.

If the web address of a website begins with https instead of http, what do you know about the website?
ANSWER: It is secure.

Content filtering is the process of restricting access to certain material.


ANSWER: True

A password ______ is a service that stores all of your account information securely.
ANSWER: manager

You realize your computer has been infected with malware. The program has been copying itself
repeatedly, using up resources. What type of malware might you have?
ANSWER: worm

You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
ANSWER: always stay connected to the Internet

An iris recognition system uses technology to read patterns in the user's ______.
ANSWER: eye

What should an AUP specify?


ANSWER: The acceptable use of technology by employees for personal reasons.
A session cookie stores user names and/or passwords so that users do not need to enter this information
every time they sign in to the website.
ANSWER: False

Which of the following is NOT a recommended practice for gaming safety?


ANSWER: Look for games that use ActiveX or JavaScript, as these are always safe.

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or
allowed/not allowed.
ANSWER: code of conduct

An encryption ______ is a set of steps that converts readable text into unreadable text.
ANSWER: encryption

You might also like