Chapter 10 Security And Privacy Exam Prep - Complete Test Bank | Visualizing Technology 7e by Debra Geoghan. DOCX document preview.

Chapter 10 Security And Privacy Exam Prep

Visualizing Technology Complete, 9e (Geoghan)

Chapter 10 Security and Privacy

1) Which cybercrime is considered to be a form of harassment?

A) Pharming

B) Clickjacking

C) Cyber-stalking

D) Phishing

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

2) The cyberbullying of one adult by another adult, using a computer is known as ________.

A) pharming

B) phishing

C) stalking

D) cyber-harassment

Diff: 3

Objective: 10.1 Recognize Different Types of Cybercrime

3) An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

A) pharming

B) cyber-stalking

C) cyberbullying

D) phishing

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

4) Clickjacking results in ________.

A) sending spam to your friends' email accounts

B) malware posting unwanted links on your Facebook page

C) you sending money to get more money in return

D) your Facebook account being closed without your knowledge

Diff: 3

Objective: 10.1 Recognize Different Types of Cybercrime

5) An email claiming that you have won a lottery might be an example of ________.

A) cyberbullying

B) computer fraud

C) cyber-stalking

D) cyber-harassment

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

6) ________ redirects you to a phony website by hijacking a domain name.

A) Phishing

B) Clickjacking

C) Shill bidding

D) Pharming

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

7) ________ is an unlawful attack on computers or networks done to intimidate a government or its people.

A) Cybercrime

B) Computer fraud

C) Cyberstalking

D) Cyberterrorism

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

8) When a company pays people to hack into its own system, it calls in ________ hackers.

A) green hat

B) black hat

C) gray hat

D) white hat

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

9) ________ hackers hack into systems to steal or vandalize.

A) Red hat

B) Black hat

C) Gray hat

D) White hat

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

10) Hacking to make a political statement is called ________.

A) politicking

B) sneaking

C) cracking

D) hacktivism

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

11) Which statement about cookies is false?

A) They are used by websites to identify you.

B) They are small text files.

C) They collect information you want to share.

D) They can be installed without your knowledge.

Diff: 3

Objective: 10.2 Differentiate between Various Types of Malware

12) The difference between a virus and a worm is a ________.

A) worm is a threat to your computer, but a virus is not

B) virus needs a host file, but a worm does not

C) virus replicates itself, but a worm cannot self-replicate

D) virus is a threat to your computer, but a worm is not

Diff: 3

Objective: 10.2 Differentiate between Various Types of Malware

13) Another name for the actual attack caused by a virus is a ________.

A) worm

B) payload

C) logic bomb

D) hoax

Diff: 3

Objective: 10.2 Differentiate between Various Types of Malware

14) Which statement about a logic bomb is false?

A) It is often planted by a disgruntled IT worker.

B) It can spread to other machines.

C) It can lay dormant until specific conditions are met.

D) It can be triggered on a specific date.

Diff: 3

Objective: 10.2 Differentiate between Various Types of Malware

15) If your computer has a ________, someone else can gain access to it undetected.

A) zombie

B) logic bomb

C) rootkit

D) botnet

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

16) A ________ changes your home page and redirects you to other websites.

A) zombie

B) browser hijacker

C) rootkit

D) botnet

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

17) A ________ appears to be a legitimate program but is actually something malicious.

A) Trojan horse

B) worm

C) rootkit

D) botnet

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

18) Antivirus software uses ________ to search for known viruses.

A) virus checks

B) stop-and-search checks

C) definition date checks

D) signature checking

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

19) A ________ connects two or more networks together.

A) repeater

B) hub

C) router

D) switch

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

20) A router is a form of security because it ________.

A) scans your email for malicious content

B) implements User Account Control (UAC)

C) scans webpages before displaying the content

D) acts like a firewall

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

21) When you set up your wireless router, you should change the ________, which is also called the wireless network name.

A) WAP

B) SSID

C) NAT

D) WEP

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

22) To secure your wireless network at home, you should ________.

A) back up the computers on the network

B) password-protect important document files

C) set the SSID to CLOSED

D) use wireless encryption with a difficult passphrase

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

23) Which device on a network performs network address translation?

A) Repeater

B) Router

C) Splitter

D) Hub

Diff: 3

Objective: 10.3 Explain How to Secure a Computer

24) You should use a(n) ________ account for everyday computing on a computer running Windows.

A) guest

B) standard

C) visitor

D) administrator

Diff: 2

Objective: 10.4 Practice Safe Computing

25) When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

A) client

B) guest

C) administrator

D) master

Diff: 2

Objective: 10.4 Practice Safe Computing

26) Which would be the strongest password?

A) customer

B) p22w0r6

C) p@55W0?d

D) p@ssw*rd

Diff: 1

Objective: 10.4 Practice Safe Computing

27) When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.

A) https

B) http

C) shttp

D) ssl

Diff: 2

Objective: 10.4 Practice Safe Computing

28) In an office acceptable use policy (AUP), which of the following might be prohibited?

A) Checking work email

B) Purchasing business supplies online

C) Logging in to eBay

D) Viewing an associate's electronic calendar

Diff: 1

Objective: 10.4 Practice Safe Computing

29) The ________ was created to make it easier for victims to report cybercrimes.

A) USA PATRIOT Act

B) Internet Crime Complaint Center

C) Homeland Security Act

D) Computer Fraud and Abuse Act

Diff: 3

Objective: 10.5 Discuss Laws Related to Computer Security and Privacy

30) The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.

A) USA PATRIOT

B) Cyber Security Enhancement

C) Computer Fraud and Abuse

D) Cybersecurity

Diff: 3

Objective: 10.5 Discuss Laws Related to Computer Security and Privacy

31) Which of the following is not a common source of adware?

A) User-generated content

B) Pop-ups

C) Banner ads on websites

D) Software

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

32) The part of the web that is indexed and searchable is known as the ________.

A) clear web

B) deep web

C) dark web

D) open web

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

33) The part of the web that is unindexed is known as the ________.

A) clear web

B) dark web

C) deep web

D) closed web

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

34) The part of the web that is encrypted and hidden is known as the ________.

A) deep web

B) surface web

C) clear web

D) dark web

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

35) Junk email is also known as ________.

A) spam

B) spim

C) malware

D) phishing

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

36) Bidding by an accomplice to drive up the price of an auction is known as ________.

A) fake bidding

B) false bidding

C) shill bidding

D) bait-and-switch bidding

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

37) The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

38) Phishing and pharming attempts are successful because they appear to be from legitimate websites.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

39) Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

40) A blackhat hacker attempts to find security holes in a system to prevent future hacking.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

41) Cyber-harassment is defined as cyberbullying between adults.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

42) Adware does not affect your computer's performance.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

43) Spam cannot be sent as a text message.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

44) Spyware is easy to remove from your computer.

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

45) Once a computer is infected, a virus can use an email program to send out copies of itself.

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

46) Worms spread over network connections without any help from users.

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

47) Another name for a bot is a zombie.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

48) A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

49) Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

50) A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

51) Firewalls can be implemented by hardware and/or software.

Diff: 1

Objective: 10.3 Explain How to Secure a Computer

52) The only program you need to fully protect your computer is a good antivirus program.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

53) Antispyware software prevents adware software from installing itself on your computer.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

54) On a Windows computer, the User Account Control notifies you before changes are made to your computer.

Diff: 2

Objective: 10.4 Practice Safe Computing

55) A hotfix resolves individual software problems as they are discovered.

Diff: 2

Objective: 10.4 Practice Safe Computing

56) A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

Diff: 1

Objective: 10.4 Practice Safe Computing

57) Encryption converts plain text into ciphertext.

Diff: 1

Objective: 10.4 Practice Safe Computing

58) The only authority responsible for investigating cybercrime in the United States is the FBI.

Diff: 2

Objective: 10.5 Discuss Laws Related to Computer Security and Privacy

59) Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.

Diff: 1

Objective: 10.5 Discuss Laws Related to Computer Security and Privacy

60) Antivirus programs only protect against viruses.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

61) Successful computer fraud schemes convince a victim to knowingly give money to another person.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

62) The danger of cookies is that they store personal information that others can access.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

63) Network address translation creates a private IP address for each device in your personal network.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

64) When you must pay for accessing content on the deep web, that is known as a payweb.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

65) Wi-Fi Protected Setup is a way to set up a secure wireless home network.

Diff: 1

Objective: 10.3 Explain How to Secure a Computer

66) Illegal activity on the Internet is referred to as ________.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

67) ________ results when cybercriminals use your name and Social Security number to open a bank account.

Diff: 1

Objective: 10.1 Recognize Different Types of Cybercrime

68) ________ is harassment of one minor by another, using a computer.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

69) A(n) ________-hat hacker hacks into systems illegally but not for malicious intent.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

70) A(n) ________-hat hacker hacks into systems to find security holes in a system for the purpose of preventing future hacking.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

71) Sending mass, unsolicited emails is called ________.

Diff: 1

Objective: 10.2 Differentiate between Various Types of Malware

72) A virus designed to attack a computer only on September 11th is called a(n) ________.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

73) A(n) ________ is a network of computer zombies controlled by a master.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

74) ________ is an anonymous, digital, encrypted currency.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

75) A(n) ________ attack sends so much traffic that it cripples a server or network.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

76) ________ software prevents adware software from being installed on your computer.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

77) ________ is a link that teases you with just enough information to get you to click the link, driving traffic to a webpage.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

78) A(n) ________ occurs when you visit a website that installs a program in the background without your knowledge.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

79) You can add wireless ________ to protect your wireless computer network.

Diff: 2

Objective: 10.3 Explain How to Secure a Computer

80) When you are led to believe shared links are safe, you have been tempted by ________.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

81) AUP stands for ________.

Diff: 3

Objective: 10.4 Practice Safe Computing

82) An attack that occurs on the day an exploit is discovered is called a(n) ________ exploit.

Diff: 2

Objective: 10.4 Practice Safe Computing

83) A programming flaw is referred to as a(n) ________.

Diff: 1

Objective: 10.4 Practice Safe Computing

84) A(n) ________ is another term for a software patch.

Diff: 2

Objective: 10.4 Practice Safe Computing

85) A security ________ is a package of security software that includes a combination of features such as antivirus, firewall, and privacy protection.

Diff: 3

Objective: 10.3 Explain How to Secure a Computer

86) Another name for a zombie computer is a(n) ________.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

87) A botnet is a massive number of networked computers, known as ________.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

88) A browser ________ changes your home page and redirects you to other websites.

Diff: 2

Objective: 10.2 Differentiate between Various Types of Malware

89) Text that has been encrypted is called ________.

Diff: 2

Objective: 10.4 Practice Safe Computing

90) Markets on the dark web are known as ________ markets.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

91) A data ________ occurs when sensitive data is stolen or viewed by someone who is not authorized to do so.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

92) When you are required to use multiple methods to sign in, you are using ________ authentication.

Diff: 3

Objective: 10.4 Practice Safe Computing

93) Another name for the clear web is the ________ web.

Diff: 2

Objective: 10.1 Recognize Different Types of Cybercrime

94) Match each of the following terms to its description:

I. phishing

II. pharming

III. hacking

IV. cracker

V. sneaker

A. gaining unauthorized access to a computer or a network

B. one who breaks into a system for malicious purposes

C. using email to try to trick you into revealing user names and passwords

D. security expert paid to break into a system

E. redirects you to a phony website

Diff: 3

Objective: 10.1 Recognize Different Types of Cybercrime

95) Match each of the following terms to its description:

I. cyberbullying

II. cyber-harassment

III. cyber-stalking

IV. cybercrime

V. cyber-terrorism

A. harassment that involves an exchange between two minors

B. unlawful activity on the Internet

C. unlawful attack on computers or networks done to intimidate a government or its people

D. pattern of harassment that poses a credible threat of harm

E. harassment that involves an exchange between adults

Diff: 3

Objective: 10.1 Recognize Different Types of Cybercrime

96) Match each of the following terms to its description:

I. spam

II. identity theft

III. adware

IV. spyware

V. cookie

A. unsolicited emails

B. program that secretly gathers information about you

C. uses pop-ups to solicit purchases

D. used to track the websites and pages you visit

E. occurs when someone uses your personal information for financial gain

Diff: 3

Objective: Multiple objectives in the chapter

97) Match each of the following terms to its description:

I. virus

II. worm

III. Trojan horse

IV. rootkit

V. bug

A. malicious program that appears to be legitimate to the user

B. program that replicates itself and needs a host file to travel

C. programs that enable someone to gain control over a computer system without the knowledge of the user

D. self-replicating but it does not need a host to travel

E. programming flaw

Diff: 3

Objective: Multiple objectives in the chapter

98) Match each of the following terms to its description:

I. keylogger

II. payload

III. drive-by-download

IV. service pack

V. hotfix

A. a visited website that installs a program in the background without your knowledge

B. planned update that addresses multiple problems, or adds multiple features

C. program that captures what you are typing

D. a virus attack

E. update that addresses individual problems as they are discovered

Diff: 3

Objective: Multiple objectives in the chapter

99) Match each of the following terms to its description:

I. clickjacking

II. shill bidding

III. data breach

IV. patch

V. ciphertext

A. a link that allows malware to post unwanted links on a webpage

B. when sensitive information is stolen or viewed by unauthorized persons

C. update that addresses individual problems as they are discovered

D. used to drive up the price of an auction item

E. encrypted information

Diff: 3

Objective: Multiple objectives in the chapter

100) Match each of the following terms to its description:

I. network address translation (NAT)

II. service set identifier (SSID)

III. Wi-Fi Protected Setup (WPS)

IV. User Account Control (UAC)

V. acceptable use policy (AUP)

A. wireless network name

B. secures a wireless home network

C. notifies you before changes are made to your computer

D. provides private IP addresses

E. specifies the rules that users must abide by

Diff: 3

Objective: Multiple objectives in the chapter

Document Information

Document Type:
DOCX
Chapter Number:
10
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 10 Security And Privacy
Author:
Debra Geoghan

Connected Book

Complete Test Bank | Visualizing Technology 7e

By Debra Geoghan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party