Chapter 10 Security And Privacy Exam Prep - Complete Test Bank | Visualizing Technology 7e by Debra Geoghan. DOCX document preview.
Visualizing Technology Complete, 9e (Geoghan)
Chapter 10 Security and Privacy
1) Which cybercrime is considered to be a form of harassment?
A) Pharming
B) Clickjacking
C) Cyber-stalking
D) Phishing
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
2) The cyberbullying of one adult by another adult, using a computer is known as ________.
A) pharming
B) phishing
C) stalking
D) cyber-harassment
Diff: 3
Objective: 10.1 Recognize Different Types of Cybercrime
3) An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
A) pharming
B) cyber-stalking
C) cyberbullying
D) phishing
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
4) Clickjacking results in ________.
A) sending spam to your friends' email accounts
B) malware posting unwanted links on your Facebook page
C) you sending money to get more money in return
D) your Facebook account being closed without your knowledge
Diff: 3
Objective: 10.1 Recognize Different Types of Cybercrime
5) An email claiming that you have won a lottery might be an example of ________.
A) cyberbullying
B) computer fraud
C) cyber-stalking
D) cyber-harassment
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
6) ________ redirects you to a phony website by hijacking a domain name.
A) Phishing
B) Clickjacking
C) Shill bidding
D) Pharming
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
7) ________ is an unlawful attack on computers or networks done to intimidate a government or its people.
A) Cybercrime
B) Computer fraud
C) Cyberstalking
D) Cyberterrorism
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
8) When a company pays people to hack into its own system, it calls in ________ hackers.
A) green hat
B) black hat
C) gray hat
D) white hat
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
9) ________ hackers hack into systems to steal or vandalize.
A) Red hat
B) Black hat
C) Gray hat
D) White hat
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
10) Hacking to make a political statement is called ________.
A) politicking
B) sneaking
C) cracking
D) hacktivism
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
11) Which statement about cookies is false?
A) They are used by websites to identify you.
B) They are small text files.
C) They collect information you want to share.
D) They can be installed without your knowledge.
Diff: 3
Objective: 10.2 Differentiate between Various Types of Malware
12) The difference between a virus and a worm is a ________.
A) worm is a threat to your computer, but a virus is not
B) virus needs a host file, but a worm does not
C) virus replicates itself, but a worm cannot self-replicate
D) virus is a threat to your computer, but a worm is not
Diff: 3
Objective: 10.2 Differentiate between Various Types of Malware
13) Another name for the actual attack caused by a virus is a ________.
A) worm
B) payload
C) logic bomb
D) hoax
Diff: 3
Objective: 10.2 Differentiate between Various Types of Malware
14) Which statement about a logic bomb is false?
A) It is often planted by a disgruntled IT worker.
B) It can spread to other machines.
C) It can lay dormant until specific conditions are met.
D) It can be triggered on a specific date.
Diff: 3
Objective: 10.2 Differentiate between Various Types of Malware
15) If your computer has a ________, someone else can gain access to it undetected.
A) zombie
B) logic bomb
C) rootkit
D) botnet
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
16) A ________ changes your home page and redirects you to other websites.
A) zombie
B) browser hijacker
C) rootkit
D) botnet
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
17) A ________ appears to be a legitimate program but is actually something malicious.
A) Trojan horse
B) worm
C) rootkit
D) botnet
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
18) Antivirus software uses ________ to search for known viruses.
A) virus checks
B) stop-and-search checks
C) definition date checks
D) signature checking
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
19) A ________ connects two or more networks together.
A) repeater
B) hub
C) router
D) switch
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
20) A router is a form of security because it ________.
A) scans your email for malicious content
B) implements User Account Control (UAC)
C) scans webpages before displaying the content
D) acts like a firewall
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
21) When you set up your wireless router, you should change the ________, which is also called the wireless network name.
A) WAP
B) SSID
C) NAT
D) WEP
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
22) To secure your wireless network at home, you should ________.
A) back up the computers on the network
B) password-protect important document files
C) set the SSID to CLOSED
D) use wireless encryption with a difficult passphrase
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
23) Which device on a network performs network address translation?
A) Repeater
B) Router
C) Splitter
D) Hub
Diff: 3
Objective: 10.3 Explain How to Secure a Computer
24) You should use a(n) ________ account for everyday computing on a computer running Windows.
A) guest
B) standard
C) visitor
D) administrator
Diff: 2
Objective: 10.4 Practice Safe Computing
25) When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
A) client
B) guest
C) administrator
D) master
Diff: 2
Objective: 10.4 Practice Safe Computing
26) Which would be the strongest password?
A) customer
B) p22w0r6
C) p@55W0?d
D) p@ssw*rd
Diff: 1
Objective: 10.4 Practice Safe Computing
27) When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
A) https
B) http
C) shttp
D) ssl
Diff: 2
Objective: 10.4 Practice Safe Computing
28) In an office acceptable use policy (AUP), which of the following might be prohibited?
A) Checking work email
B) Purchasing business supplies online
C) Logging in to eBay
D) Viewing an associate's electronic calendar
Diff: 1
Objective: 10.4 Practice Safe Computing
29) The ________ was created to make it easier for victims to report cybercrimes.
A) USA PATRIOT Act
B) Internet Crime Complaint Center
C) Homeland Security Act
D) Computer Fraud and Abuse Act
Diff: 3
Objective: 10.5 Discuss Laws Related to Computer Security and Privacy
30) The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
A) USA PATRIOT
B) Cyber Security Enhancement
C) Computer Fraud and Abuse
D) Cybersecurity
Diff: 3
Objective: 10.5 Discuss Laws Related to Computer Security and Privacy
31) Which of the following is not a common source of adware?
A) User-generated content
B) Pop-ups
C) Banner ads on websites
D) Software
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
32) The part of the web that is indexed and searchable is known as the ________.
A) clear web
B) deep web
C) dark web
D) open web
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
33) The part of the web that is unindexed is known as the ________.
A) clear web
B) dark web
C) deep web
D) closed web
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
34) The part of the web that is encrypted and hidden is known as the ________.
A) deep web
B) surface web
C) clear web
D) dark web
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
35) Junk email is also known as ________.
A) spam
B) spim
C) malware
D) phishing
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
36) Bidding by an accomplice to drive up the price of an auction is known as ________.
A) fake bidding
B) false bidding
C) shill bidding
D) bait-and-switch bidding
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
37) The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
38) Phishing and pharming attempts are successful because they appear to be from legitimate websites.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
39) Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
40) A blackhat hacker attempts to find security holes in a system to prevent future hacking.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
41) Cyber-harassment is defined as cyberbullying between adults.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
42) Adware does not affect your computer's performance.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
43) Spam cannot be sent as a text message.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
44) Spyware is easy to remove from your computer.
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
45) Once a computer is infected, a virus can use an email program to send out copies of itself.
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
46) Worms spread over network connections without any help from users.
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
47) Another name for a bot is a zombie.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
48) A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
49) Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
50) A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
51) Firewalls can be implemented by hardware and/or software.
Diff: 1
Objective: 10.3 Explain How to Secure a Computer
52) The only program you need to fully protect your computer is a good antivirus program.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
53) Antispyware software prevents adware software from installing itself on your computer.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
54) On a Windows computer, the User Account Control notifies you before changes are made to your computer.
Diff: 2
Objective: 10.4 Practice Safe Computing
55) A hotfix resolves individual software problems as they are discovered.
Diff: 2
Objective: 10.4 Practice Safe Computing
56) A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
Diff: 1
Objective: 10.4 Practice Safe Computing
57) Encryption converts plain text into ciphertext.
Diff: 1
Objective: 10.4 Practice Safe Computing
58) The only authority responsible for investigating cybercrime in the United States is the FBI.
Diff: 2
Objective: 10.5 Discuss Laws Related to Computer Security and Privacy
59) Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.
Diff: 1
Objective: 10.5 Discuss Laws Related to Computer Security and Privacy
60) Antivirus programs only protect against viruses.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
61) Successful computer fraud schemes convince a victim to knowingly give money to another person.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
62) The danger of cookies is that they store personal information that others can access.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
63) Network address translation creates a private IP address for each device in your personal network.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
64) When you must pay for accessing content on the deep web, that is known as a payweb.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
65) Wi-Fi Protected Setup is a way to set up a secure wireless home network.
Diff: 1
Objective: 10.3 Explain How to Secure a Computer
66) Illegal activity on the Internet is referred to as ________.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
67) ________ results when cybercriminals use your name and Social Security number to open a bank account.
Diff: 1
Objective: 10.1 Recognize Different Types of Cybercrime
68) ________ is harassment of one minor by another, using a computer.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
69) A(n) ________-hat hacker hacks into systems illegally but not for malicious intent.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
70) A(n) ________-hat hacker hacks into systems to find security holes in a system for the purpose of preventing future hacking.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
71) Sending mass, unsolicited emails is called ________.
Diff: 1
Objective: 10.2 Differentiate between Various Types of Malware
72) A virus designed to attack a computer only on September 11th is called a(n) ________.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
73) A(n) ________ is a network of computer zombies controlled by a master.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
74) ________ is an anonymous, digital, encrypted currency.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
75) A(n) ________ attack sends so much traffic that it cripples a server or network.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
76) ________ software prevents adware software from being installed on your computer.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
77) ________ is a link that teases you with just enough information to get you to click the link, driving traffic to a webpage.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
78) A(n) ________ occurs when you visit a website that installs a program in the background without your knowledge.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
79) You can add wireless ________ to protect your wireless computer network.
Diff: 2
Objective: 10.3 Explain How to Secure a Computer
80) When you are led to believe shared links are safe, you have been tempted by ________.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
81) AUP stands for ________.
Diff: 3
Objective: 10.4 Practice Safe Computing
82) An attack that occurs on the day an exploit is discovered is called a(n) ________ exploit.
Diff: 2
Objective: 10.4 Practice Safe Computing
83) A programming flaw is referred to as a(n) ________.
Diff: 1
Objective: 10.4 Practice Safe Computing
84) A(n) ________ is another term for a software patch.
Diff: 2
Objective: 10.4 Practice Safe Computing
85) A security ________ is a package of security software that includes a combination of features such as antivirus, firewall, and privacy protection.
Diff: 3
Objective: 10.3 Explain How to Secure a Computer
86) Another name for a zombie computer is a(n) ________.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
87) A botnet is a massive number of networked computers, known as ________.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
88) A browser ________ changes your home page and redirects you to other websites.
Diff: 2
Objective: 10.2 Differentiate between Various Types of Malware
89) Text that has been encrypted is called ________.
Diff: 2
Objective: 10.4 Practice Safe Computing
90) Markets on the dark web are known as ________ markets.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
91) A data ________ occurs when sensitive data is stolen or viewed by someone who is not authorized to do so.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
92) When you are required to use multiple methods to sign in, you are using ________ authentication.
Diff: 3
Objective: 10.4 Practice Safe Computing
93) Another name for the clear web is the ________ web.
Diff: 2
Objective: 10.1 Recognize Different Types of Cybercrime
94) Match each of the following terms to its description:
I. phishing
II. pharming
III. hacking
IV. cracker
V. sneaker
A. gaining unauthorized access to a computer or a network
B. one who breaks into a system for malicious purposes
C. using email to try to trick you into revealing user names and passwords
D. security expert paid to break into a system
E. redirects you to a phony website
Diff: 3
Objective: 10.1 Recognize Different Types of Cybercrime
95) Match each of the following terms to its description:
I. cyberbullying
II. cyber-harassment
III. cyber-stalking
IV. cybercrime
V. cyber-terrorism
A. harassment that involves an exchange between two minors
B. unlawful activity on the Internet
C. unlawful attack on computers or networks done to intimidate a government or its people
D. pattern of harassment that poses a credible threat of harm
E. harassment that involves an exchange between adults
Diff: 3
Objective: 10.1 Recognize Different Types of Cybercrime
96) Match each of the following terms to its description:
I. spam
II. identity theft
III. adware
IV. spyware
V. cookie
A. unsolicited emails
B. program that secretly gathers information about you
C. uses pop-ups to solicit purchases
D. used to track the websites and pages you visit
E. occurs when someone uses your personal information for financial gain
Diff: 3
Objective: Multiple objectives in the chapter
97) Match each of the following terms to its description:
I. virus
II. worm
III. Trojan horse
IV. rootkit
V. bug
A. malicious program that appears to be legitimate to the user
B. program that replicates itself and needs a host file to travel
C. programs that enable someone to gain control over a computer system without the knowledge of the user
D. self-replicating but it does not need a host to travel
E. programming flaw
Diff: 3
Objective: Multiple objectives in the chapter
98) Match each of the following terms to its description:
I. keylogger
II. payload
III. drive-by-download
IV. service pack
V. hotfix
A. a visited website that installs a program in the background without your knowledge
B. planned update that addresses multiple problems, or adds multiple features
C. program that captures what you are typing
D. a virus attack
E. update that addresses individual problems as they are discovered
Diff: 3
Objective: Multiple objectives in the chapter
99) Match each of the following terms to its description:
I. clickjacking
II. shill bidding
III. data breach
IV. patch
V. ciphertext
A. a link that allows malware to post unwanted links on a webpage
B. when sensitive information is stolen or viewed by unauthorized persons
C. update that addresses individual problems as they are discovered
D. used to drive up the price of an auction item
E. encrypted information
Diff: 3
Objective: Multiple objectives in the chapter
100) Match each of the following terms to its description:
I. network address translation (NAT)
II. service set identifier (SSID)
III. Wi-Fi Protected Setup (WPS)
IV. User Account Control (UAC)
V. acceptable use policy (AUP)
A. wireless network name
B. secures a wireless home network
C. notifies you before changes are made to your computer
D. provides private IP addresses
E. specifies the rules that users must abide by
Diff: 3
Objective: Multiple objectives in the chapter