Filters
Question type

Study Flashcards

Biometric objects are entirely foolproof.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -An authorized person or company that issues and verifies digital certificates.

Correct Answer

verifed

verified

The term CAPTCHA is _____________.


A) a private combination of words associated with a user name that allows access to computer resources
B) the average time it takes a computer to discover a password based on the number of characters
C) a digital image used to help decipher a faded or blurry word in digitized news archives
D) a series of distorted characters that a user is required to enter correctly to continue using a website

Correct Answer

verifed

verified

What term is used to describe the process of restricting access to certain material on the web?


A) content filtering
B) information monitoring
C) data mining
D) social profiling

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -Protects any tangible form of expression.

Correct Answer

verifed

verified

  -Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure. -Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

Correct Answer

verifed

verified

The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

Correct Answer

verifed

verified

  -The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure. -The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

Correct Answer

verifed

verified

Which of the following statements is not true about Internet and network attacks?


A) No central administrator is present on the Internet.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

Correct Answer

verifed

verified

The term firewall is _____________.


A) the access point a hacker uses to intrude on a computer or network
B) a program that searches for cybercriminals by looking for patterns in attacks
C) hardware and/or software that protects a network's resources from intrusion
D) a virus that prevents the computer or network from accessing outside resources

Correct Answer

verifed

verified

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -Outlines the activities for which a computer or network may and may not be used.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -A notice that guarantees a user or a website is legitimate.

Correct Answer

verifed

verified

The term back door, as it refers to computer crime, is _____________.


A) the area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future
B) a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
C) the vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
D) a weakness in a computer or network's security system that enables criminals to gain unauthorized access

Correct Answer

verifed

verified

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Correct Answer

verifed

verified

Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

Correct Answer

verifed

verified

Audit trails only record unsuccessful access attempts.

Correct Answer

verifed

verified

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

Correct Answer

verifed

verified

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

Correct Answer

verifed

verified

Which of the following is a federally funded Internet security research and development center?


A) W3C
B) NSF
C) CERT/CC
D) Internet2

Correct Answer

verifed

verified

Showing 101 - 120 of 200

Related Exams

Show Answer