1-5

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
substitution
Which of the following can be used to create a software registration number, sometimes illegally?
keygen
Which of the following is a federally funded Internet security research and development center?
CERT/CC
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
Electronic Communication Privacy Act
Which of the following does your financial institution use to reduce fraud?
signature verification system
hand geometry system
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?
cookie
Which of the following is an authorized person or company that issues and verifies digital certificates?
certificate authority
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
macros
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
malware
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
product activation
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
network
Which of the following can be used to create a software registration number, sometimes illegally?
keygen
Which of the following statements is not true about Internet and network attacks?
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
The term, payload, as it pertains to computer crime, is defined as _____________.
the destructive event or prank the program is intended to deliver
the financial burden computer crime places on its victims
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
digital forensics
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
transposition
Which of the following is the least likely motive for a DDoS?
spoofing
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
Caesar cipher
Websites use which of the following to keep track of items in a user’s shopping cart?
session cookie
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
a digital signature
Which of the following does your company use to track your time and attendance?
hand geometry system
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
substitution
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
cracker
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
clickjacking
Which of the following statements is not true about Internet and network attacks?
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
an encryption algorithm
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
The term firewall is _____________.
Correct hardware and/or software that protects a network’s resources from intrusion
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
an audit trail
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
product activation
Which term is used to describe software used by cybercriminals?
crimeware
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
backup
Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts
Websites use which of the following to keep track of items in a user’s shopping cart?
session cookie
What is another name for public key encryption?
asymmetric key encryption
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
an IT code of conduct
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
IP
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
digital forensics
The term, botnet, means _____________.
a group of compromised computers connected to a network that attacks other networks
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
They restore the files.
What is an EULA intended to do?
license software for individual use
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
ethical
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
voice verification system
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Electronic Communications Privacy Act (ECPA)
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?
phishing
Which of the following statements is not true about Internet and network attacks?
Information kept on an organization’s premises has a higher security risk than information transmitted over networks
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a worm
Which of the following categories are the rights to which creators are entitled for their work?
intellectual property
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
an encryption algorithm
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a rootkit
The term, zombie, is _____________.
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
cracker
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
substitution
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
decryption
Many businesses use which of the following to limit employees’ web access?
content filtering
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
password
Which term is used to describe software used by cybercriminals?
crimeware
Which of the following terms means in a location separate from the computer site?
off-site
Which of the following is the least likely motive for a DDoS?
spoofing
Which of the following is an authorized person or company that issues and verifies digital certificates?
certificate authority
Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
Which of the following does your financial institution use to reduce fraud?
signature verification system
Which of the following can transmit germs?
hand geometry systems
What happens during a DDoS attack?
A zombie army is used to attack computers or computer networks.
What term is used to illustrate the gap between those with and those without access to technology?
digital divide
Which of the following gestures would you use if you want to run a new browser app on your new tablet?
double-tap
Which of the following is an electronic version of a printed book, readable on computers and other digital devices?
e-book
Which of the following works in a manner similar to a copy machine?
scanner
Which of the following category of users works on a computer while away from a main office, home office, or school?
mobile
What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?
software
Which of the following conveys meaning and is useful to users?
information
In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?
point
Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?
press and hold
Which of the following is true about a computer?
Its electronic components process data using instructions.
Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?
Position the display about 90 degrees below eye level.
What is a type of personal computer designed so all of its components fit entirely on or under a desk or table?
desktop computer
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?
cloud storage
How often should you change your password?
Every three months
A leading maker of security software has made a claim that its software blocked a given number of malware attacks in a single year. From your knowledge of malware, which of the following is the likeliest number from that claim?
5 billion
Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?
press and hold
If a tablet has no keyboard, how do you type on it?
You use an on-screen keyboard.
Which of the following is a specification that enables web content to be distributed to subscribers?
RSS
You interact with a program through which of the following, thereby controlling how you enter data and instructions and how information is displayed on the screen?
operating system
In which of the following mouse operations do you press and release the secondary mouse button?
right click
Which of the following is NOT a type of message you can send with a smartphone?
media message
Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure?
thinbook
Which of the following gestures would you use if you want to activate a link on your new tablet?
tap
Which of the following enables users to speak to other users over the Internet?
IM
In which of the following mouse operations do you point to an item, hold down the left mouse button, move the item to the desired location on the screen, and then release the left mouse button?
Drag
Which kind of user requires the capabilities of a powerful computer?
power
How do you determine which type of computer — tablet, laptop, or desktop — is best?
it depends on your needs
What involves reducing the electricity consumed and environmental waste generated when using a computer?
green computing
Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called?
convergence
Which of the following is NOT a strategy that supports green computing?
creating web apps instead of desktop apps
Who is Microsoft’s founder?
Bill Gates
If you are looking for an online social network that allows you to share messages and interests with family and friends, which of the following is the best match for you?
Facebook
Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?
optical
Which of the following mouse operations would you use if you want to display a shortcut menu?
right-click
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?
network
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?
computer
Which of the following is not one of the reasons that a mobile device can be categorized as a computer?
it can accept output
Which of the following is a popular social networking site?
facebook
In which gesture do you move two fingers together?
pinch
Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network?
wi-fi
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?
application software
Which of the following is a typical size for a game console?
four pounds
Green computing involves reducing electricity consumed and environmental waste generated when using a computer. Which of the following is a valid strategy for supporting green computing?
Buy a computer from a retailer who will dispose of your old computer properly
Which of the following gestures would you use if you want to move an item around the screen on your new tablet?
slide
A website’s home page is most analogous to which of the following?
cover of a book
Your sister just started a company that provides individuals and organizations access to the Internet for a small fee. Which of the following describes her company?
access provider
You have a new web app and the host for it is going to provide storage for your data on their server. What is this called?
cloud storage
What separates the components of a domain name?
periods
Which of the following allows access to high-speed Internet services through the cable television network?
cable modem
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online?
nettiquette
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
DSL
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
A Wi-Fi’s Internet service can be dial-up access.
What are two elements found in an email address?
user name and domain name
What is the role of the W3C?
oversee research and set standards for many areas of the Internet
Which of the following is a group of email names and addresses used for mass distribution of a message?
email list
Which of the following is a component of a Uniform Resource Locator?
domain name
For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages?
instant messaging
Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?
satellite modem