Test 2 Chapter 5

Card Set Information

Author:
victoriadeberry
ID:
263998
Filename:
Test 2 Chapter 5
Updated:
2014-02-25 22:11:22
Tags:
Test Chapter
Folders:
Test 2 Chapter 5
Description:
Test 2 Chapter 5
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user victoriadeberry on FreezingBlue Flashcards. What would you like to do?


  1. Websites use which of the following to keep track of items in a user’s shopping cart?

    A.zombie
    B.session cookie
    C.adware
    D.shopping bot
    B. session cookie
    (this multiple choice question has been scrambled)
  2. Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

    A.manager filtering
    B.employee indexing
    C.employee monitoring
    D.job spamming
    C. employee monitoring
    (this multiple choice question has been scrambled)
  3. How long can digital certificates be valid?

    A.five years
    B.four years
    C.six months
    D.two years
    D. two years
    (this multiple choice question has been scrambled)
  4. With which of the following do users choose which folders and files to include in a backup?

    A.selective backup
    B.incremental backup
    C.differential backup
    D.full backup
    A. selective backup
    (this multiple choice question has been scrambled)
  5. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

    A.cybermalls
    B.malware
    C.threats
    D.untrusted sources
    B. malware
    (this multiple choice question has been scrambled)
  6. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

    A.The index the files.
    B.They reset the files.
    C.They restore the files.
    D.They resource the files.
    C. They restore the files.
    (this multiple choice question has been scrambled)
  7. Which of the following is an authorized person or company that issues and verifies digital certificates?

    A.certificate agency
    B.certificate authority
    C.certificate office
    D.certificate bureau
    B. certificate authority
    (this multiple choice question has been scrambled)
  8. Internet advertising firms often use which of the following to collect information about users web browsing habits?

    A.postware
    B.comware
    C.billware
    D.spyware
    D. spyware
    (this multiple choice question has been scrambled)
  9. Which of the following provides the mobile user with a secure connection to the company network server?

    A.TPN
    B.VPN
    C.SPN
    D.XPN
    B. VPN
    (this multiple choice question has been scrambled)
  10. Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

    A.rebuking
    B.victimizing
    C.spoofing 
    D.transmitting
    C. spoofing
    (this multiple choice question has been scrambled)
  11. Which of the following copies all of the files in a computer?

    A.selective backup
    B.differential backup
    C.incremental backup
    D.full backup
    D. full backup
    (this multiple choice question has been scrambled)
  12. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

    A.site
    B.network
    C.multipurpose
    D.distributed
    A. site
    (this multiple choice question has been scrambled)
  13. Which of the following provides the mobile user with a secure connection to the company network server?

    A.SPN
    B.XPN
    C.TPN
    D.VPN
    D. VPN
    (this multiple choice question has been scrambled)
  14. Which encryption algorithm inserts characters between existing characters?

    A.expansion
    B.transposition
    C.compaction
    D.substitution
    A. expansion
    (this multiple choice question has been scrambled)
  15. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

    A.assessment
    B.digitization
    C.re-securing
    D.decryption
    D. decryption
    (this multiple choice question has been scrambled)
  16. What is another name for public key encryption?

    A.secure key encryption
    B.controlled key encryption
    C.virtual key encryption
    D.asymmetric key encryption
    D. asymmetric key emcryption
    (this multiple choice question has been scrambled)
  17. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

    A.TCP
    B.IP
    C.DoS
    D.PGP
    B. IP
    (this multiple choice question has been scrambled)
  18. Into which of the following kinds of ports do external fingerprint readers plug?

    A.parallel
    B.USB
    C.MIDI
    D.serial
    B. USB
    (this multiple choice question has been scrambled)
  19. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

    A.cyberterrorist
    B.script kiddie
    C.hacker
    D.cyberextortionist
    B. script kiddie
    (this multiple choice question has been scrambled)
  20. Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

    A.Computer Fraud and Abuse Act
    B.Computer Matching and Privacy Protection Act
    C.Electronic Communications Privacy Act (ECPA)
    D.Fair Credit Reporting Act
    C. Electronic Communications Privacy Act (ECPA)
    (this multiple choice question has been scrambled)
  21. With a three-generation backup policy, the grandparent is which of the following?

    A.most recent copy of the file
    B.original file
    C.second oldest copy of the file
    D.oldest copy of the file
    D. oldest copy of the file
    (this multiple choice question has been scrambled)
  22. Which of the following terms refers to making a copy of a file?

    A.deciphering
    B.backing up
    C.encrypting
    D.restoring
    B. backing up
    (this multiple choice question has been scrambled)
  23. Which of the following is not a possessed object?

    A.smart card
    B.PIN
    C.key
    D.badge
    B. PIN
    (this multiple choice question has been scrambled)
  24. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

    A.distributed
    B.staggered
    C.limited
    D.delayed
    A. distributed
    (this multiple choice question has been scrambled)
  25. What is the term for a program that performs a repetitive task on a network?

    A.bot
    B.rootkit
    C.zombie
    D.Trojan horse
    A. bot
    (this multiple choice question has been scrambled)
  26. Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

    A.backdoors
    B.macros
    C.keygens
    D.indices
    B. macros
    (this multiple choice question has been scrambled)
  27. Which of the following categories are the rights to which creators are entitled for their work?

    A.intellectual property
    B.community property
    C.ethical
    D.creative
    A. intellectual property
    (this multiple choice question has been scrambled)
  28. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

    A.digital
    B.secure
    C.assigned
    D.protected
    A. digital
    (this multiple choice question has been scrambled)
  29. Which of the following is not a security product developer?

    A.McAfee
    B.AVG
    C.Symantec
    D.Adobe
    D. Adobe
    (this multiple choice question has been scrambled)
  30. What is the term for a website that uses encryption techniques to protect its data?

    A.virtual site
    B.secure site
    C.vault
    D.locked site
    B. secure site
    (this multiple choice question has been scrambled)
  31. How long can digital certificates be valid?

    A.two years
    B.four years
    C.five years
    D.six months
    A. two years
    (this multiple choice question has been scrambled)
  32. How much do fingerprint readers typically cost?

    A.between $250 and $500
    B.more than $1000
    C.less than $100
    D.less than $10
    C. less than $100
    (this multiple choice question has been scrambled)
  33. Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

    A.site
    B.network
    C.multipurpose
    D.distributed
    A. site
    (this multiple choice question has been scrambled)

  34. Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

    A.PIN
    B.passterm
    C.password
    D.secure key
    C. password
    (this multiple choice question has been scrambled)
  35. Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

    a.data rights
    b.information privacy
    c.acceptable use
    d.social restrictions
    b . information privacy
  36. Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

    A.intellectual property deed
    B.copyright
    C.content license
    D.access right
    B. copyright
    (this multiple choice question has been scrambled)
  37. Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

    A.SECURE ELECTRONICS
    B.ENERGY STAR
    C.ACCEPTABLE USE
    D.GREEN COMPUTING
    B. ENERGY STAR
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview