ログイン

IT MID CHAP 5

IT MID CHAP 5
63問 • 2年前
  • Irina Kayla Rottey
  • 通報

    問題一覧

  • 1

    is any event or action that could cause a loss of or damage to a computer or mobile device hardware

    Digital security risk

  • 2

    Any illegal act involving the use of a computer or related devices generally is referred to as a

    computer crime

  • 3

    is an online or Internet-based illegal act

    cybercrime

  • 4

    Digital Security Risks

    Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberextortionist Cyberterrorist

  • 5

    short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

    Malware

  • 6

    Common type of Malware

    Virus Worm Trojan Horse Rootkit Spyware Adware

  • 7

    is a group of compromised computers or mobile devices connected to a network

    botnet

  • 8

    compromised computer or device is known as a

    zombie

  • 9

    disrupts computer access to an Internet service

    denial of service attack (DoS attack)

  • 10

    is a program or set of instructions in a program that allow users to bypass security controls

    back door

  • 11

    a technique intruders use to make their network or Internet transmission appear legitimate

    Spoofing

  • 12

    hardware and/or software that protects a network’s resources from intrusion

    firewall

  • 13

    the use of a computer or network without permission use is the use of a computer or its data for unapproved or possibly illegal activities

    Unauthorized access

  • 14

    Organizations take _ to help prevent unauthorized access and use

    several methods

  • 15

    Organizations use:

    Acceptable use policy Disable file and printer sharing

  • 16

    define who can access a computer, device, or network; when they can access it;

    Access controls

  • 17

    the computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts

    – User name – Password

  • 18

    private combination of words,

    passphrase

  • 19

    sometimes called a passcode, is a numeric password,

    PIN (Personal Identification Number)

  • 20

    authenticates a person’s identity by translating a personal characteristic into a digital code

    biometric device

  • 21

    Unauthorized Access and Use:

    Fingerprint reader Face recognition system Hand geometry system Voice verification system Signature verification system Iris recognition system

  • 22

    uses two separate methods, one after the next, to verify the identity of a user

    Two-step verification

  • 23

    is the discovery, collection, and analysis of evidence found on computers and networks

    Digital forensics

  • 24

    Many areas use digital forensics:

    Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments

  • 25

    occurs when someone: Steals software media Intentionally erases programs Illegally registers and/or activates a program Illegally copies a program

    Software theft

  • 26

    users provide the software product’s identification number to associate the software

    product activation

  • 27

    is the right to use software

    license agreement

  • 28

    occurs when someone steals personal or confidential information

    Information theft

  • 29

    is a process of converting data that is readable by humans into encoded characters

    Encryption

  • 30

    is an encrypted code that verify the identity of the message sender

    digital signature

  • 31

    is a notice that guarantees a user or a website is legitimate

    digital certificate

  • 32

    website that uses encryption techniques to secure its data is known as

    secure site

  • 33

    is the act of stealing digital equipment

    Hardware theft

  • 34

    is the act of defacing or destroying digital equipment

    Hardware vandalism

  • 35

    is a duplicate of a file, program, or media

    backup

  • 36

    a file means to make a copy of it

    To back up

  • 37

    Categories of backups:

    – Full – Differential – Incremental – Selective – Continuous data protection – Cloud

  • 38

    Type of Back ups

    *refer to image

  • 39

    Wireless access poses additional security risks • Some perpetrators connect to other’s wireless networks to gain free Internet access or confidential data • Others connect to a network through an unsecured wireless access point (WAP) or combination router/WAP

    TRUE

  • 40

    are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

    Technology ethics

  • 41

    – Not all information on the Internet is correct

    Information accuracy is a concern

  • 42

    refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos

    Intellectual property

  • 43

    are the rights to which creators are entitled to their work

    Intellectual property rights

  • 44

    protects any tangible form of expression

    copyright

  • 45

    is a strategy designed to prevent illegal distribution of movies, music, and other digital content

    Digital rights management (DRM)

  • 46

    is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

    code of conduct

  • 47

    involves reducing the electricity and environmental waste while using computers

    Green computing

  • 48

    refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of info about them

    Information privacy

  • 49

    • Huge databases store data online • Websites often collect data about you, so that they can customize advertisements and send you personalized email messages • Some employers monitor your computer usage and email messages

    TRUE

  • 50

    • Information about you can be stored in a database when you:

    – Fill out a printed or online form – Create a profile on an online social network – Register a product warranty

  • 51

    is a small text file that a web server stores on your computer

    cookie

  • 52

    Websites use cookies for a variety of reasons:

    Allow for personalization Store user names and/or passwords Assist with online shopping Track how often users visit a site Target advertisements

  • 53

    is a scam in which a perpetrator sends an official looking email message

    Phishing

  • 54

    an object that can be tapped or clicked on a website contains a malicious program

    clickjacking

  • 55

    is a program placed on a device without the user’s knowledge that secretly collects information about the user and then communicates it to some outside site

    Spyware

  • 56

    is a program that displays an online advertisement in a banner or pop-up window

    Adware

  • 57

    is defined as gaining unauthorized access to or obtaining confidential information by taking advantage

    Social engineering

  • 58

    involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology,

    Employee monitoring

  • 59

    Many programs exist that easily allow employers to monitor employees. Further, it is legal for employers to use these programs

    TRUE

  • 60

    The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data

    TRUE

  • 61

    is the process of restricting access to certain material

    Content filtering

  • 62

    restricts access to specified websites

    Web filtering software

  • 63

    *refer to image

    Common type of Malware

  • STS CHAP 6 n 7

    STS CHAP 6 n 7

    Irina Kayla Rottey · 36問 · 2年前

    STS CHAP 6 n 7

    STS CHAP 6 n 7

    36問 • 2年前
    Irina Kayla Rottey

    STS CHAP 8

    STS CHAP 8

    Irina Kayla Rottey · 32問 · 2年前

    STS CHAP 8

    STS CHAP 8

    32問 • 2年前
    Irina Kayla Rottey

    HPC CHAP 3

    HPC CHAP 3

    Irina Kayla Rottey · 16問 · 2年前

    HPC CHAP 3

    HPC CHAP 3

    16問 • 2年前
    Irina Kayla Rottey

    HPC CHAP 5

    HPC CHAP 5

    Irina Kayla Rottey · 33問 · 2年前

    HPC CHAP 5

    HPC CHAP 5

    33問 • 2年前
    Irina Kayla Rottey

    FO

    FO

    Irina Kayla Rottey · 21問 · 2年前

    FO

    FO

    21問 • 2年前
    Irina Kayla Rottey

    HK 1

    HK 1

    Irina Kayla Rottey · 32問 · 2年前

    HK 1

    HK 1

    32問 • 2年前
    Irina Kayla Rottey

    HK 2

    HK 2

    Irina Kayla Rottey · 61問 · 2年前

    HK 2

    HK 2

    61問 • 2年前
    Irina Kayla Rottey

    Legal 3

    Legal 3

    Irina Kayla Rottey · 30問 · 1年前

    Legal 3

    Legal 3

    30問 • 1年前
    Irina Kayla Rottey

    ..

    ..

    Irina Kayla Rottey · 37問 · 1年前

    ..

    ..

    37問 • 1年前
    Irina Kayla Rottey

    問題一覧

  • 1

    is any event or action that could cause a loss of or damage to a computer or mobile device hardware

    Digital security risk

  • 2

    Any illegal act involving the use of a computer or related devices generally is referred to as a

    computer crime

  • 3

    is an online or Internet-based illegal act

    cybercrime

  • 4

    Digital Security Risks

    Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberextortionist Cyberterrorist

  • 5

    short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

    Malware

  • 6

    Common type of Malware

    Virus Worm Trojan Horse Rootkit Spyware Adware

  • 7

    is a group of compromised computers or mobile devices connected to a network

    botnet

  • 8

    compromised computer or device is known as a

    zombie

  • 9

    disrupts computer access to an Internet service

    denial of service attack (DoS attack)

  • 10

    is a program or set of instructions in a program that allow users to bypass security controls

    back door

  • 11

    a technique intruders use to make their network or Internet transmission appear legitimate

    Spoofing

  • 12

    hardware and/or software that protects a network’s resources from intrusion

    firewall

  • 13

    the use of a computer or network without permission use is the use of a computer or its data for unapproved or possibly illegal activities

    Unauthorized access

  • 14

    Organizations take _ to help prevent unauthorized access and use

    several methods

  • 15

    Organizations use:

    Acceptable use policy Disable file and printer sharing

  • 16

    define who can access a computer, device, or network; when they can access it;

    Access controls

  • 17

    the computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts

    – User name – Password

  • 18

    private combination of words,

    passphrase

  • 19

    sometimes called a passcode, is a numeric password,

    PIN (Personal Identification Number)

  • 20

    authenticates a person’s identity by translating a personal characteristic into a digital code

    biometric device

  • 21

    Unauthorized Access and Use:

    Fingerprint reader Face recognition system Hand geometry system Voice verification system Signature verification system Iris recognition system

  • 22

    uses two separate methods, one after the next, to verify the identity of a user

    Two-step verification

  • 23

    is the discovery, collection, and analysis of evidence found on computers and networks

    Digital forensics

  • 24

    Many areas use digital forensics:

    Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments

  • 25

    occurs when someone: Steals software media Intentionally erases programs Illegally registers and/or activates a program Illegally copies a program

    Software theft

  • 26

    users provide the software product’s identification number to associate the software

    product activation

  • 27

    is the right to use software

    license agreement

  • 28

    occurs when someone steals personal or confidential information

    Information theft

  • 29

    is a process of converting data that is readable by humans into encoded characters

    Encryption

  • 30

    is an encrypted code that verify the identity of the message sender

    digital signature

  • 31

    is a notice that guarantees a user or a website is legitimate

    digital certificate

  • 32

    website that uses encryption techniques to secure its data is known as

    secure site

  • 33

    is the act of stealing digital equipment

    Hardware theft

  • 34

    is the act of defacing or destroying digital equipment

    Hardware vandalism

  • 35

    is a duplicate of a file, program, or media

    backup

  • 36

    a file means to make a copy of it

    To back up

  • 37

    Categories of backups:

    – Full – Differential – Incremental – Selective – Continuous data protection – Cloud

  • 38

    Type of Back ups

    *refer to image

  • 39

    Wireless access poses additional security risks • Some perpetrators connect to other’s wireless networks to gain free Internet access or confidential data • Others connect to a network through an unsecured wireless access point (WAP) or combination router/WAP

    TRUE

  • 40

    are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

    Technology ethics

  • 41

    – Not all information on the Internet is correct

    Information accuracy is a concern

  • 42

    refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos

    Intellectual property

  • 43

    are the rights to which creators are entitled to their work

    Intellectual property rights

  • 44

    protects any tangible form of expression

    copyright

  • 45

    is a strategy designed to prevent illegal distribution of movies, music, and other digital content

    Digital rights management (DRM)

  • 46

    is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

    code of conduct

  • 47

    involves reducing the electricity and environmental waste while using computers

    Green computing

  • 48

    refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of info about them

    Information privacy

  • 49

    • Huge databases store data online • Websites often collect data about you, so that they can customize advertisements and send you personalized email messages • Some employers monitor your computer usage and email messages

    TRUE

  • 50

    • Information about you can be stored in a database when you:

    – Fill out a printed or online form – Create a profile on an online social network – Register a product warranty

  • 51

    is a small text file that a web server stores on your computer

    cookie

  • 52

    Websites use cookies for a variety of reasons:

    Allow for personalization Store user names and/or passwords Assist with online shopping Track how often users visit a site Target advertisements

  • 53

    is a scam in which a perpetrator sends an official looking email message

    Phishing

  • 54

    an object that can be tapped or clicked on a website contains a malicious program

    clickjacking

  • 55

    is a program placed on a device without the user’s knowledge that secretly collects information about the user and then communicates it to some outside site

    Spyware

  • 56

    is a program that displays an online advertisement in a banner or pop-up window

    Adware

  • 57

    is defined as gaining unauthorized access to or obtaining confidential information by taking advantage

    Social engineering

  • 58

    involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology,

    Employee monitoring

  • 59

    Many programs exist that easily allow employers to monitor employees. Further, it is legal for employers to use these programs

    TRUE

  • 60

    The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data

    TRUE

  • 61

    is the process of restricting access to certain material

    Content filtering

  • 62

    restricts access to specified websites

    Web filtering software

  • 63

    *refer to image

    Common type of Malware