Chapter 5 Terms

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
malware
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
Spoofing
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
Decryption
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Electronic Communications Privacy Act (ECPA)
Many businesses use which of the following to limit employees’ web access?
content filtering
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
Digital security risk
Which of the following categories are the rights to which creators are entitled for their work?
Intellectual property
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
Copyright
Which of the following can transmit germs?
Hand geometry systems
Internet advertising firms often use which of the following to collect information about users web browsing habits?
Spyware
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
Backup
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Digital
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
Network
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
Macros
Which of the following is the process of restricting access to certain material on the web?
Content filtering
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
Ethical
Into which of the following kinds of ports do external fingerprint readers plug?
USB
With a three-generation backup policy, the grandparent is which of the following?
Oldest copy of the file
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
Password
Which of the following is an authorized person or company that issues and verifies digital certificates?
Certificate authority
Websites use which of the following to keep track of items in a user’s shopping cart?
Session cookie
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?
Cookie
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
Distributed
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
They restore the files.
What is another name for public key encryption?
asymmetric key encryption
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
Site
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
Employee monitoring
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
Cyberterrorist
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
IP
Which of the following copies all of the files in a computer?
Full backup
How long can digital certificates be valid?
Two years
Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure?
cyberextortionist
Which of the following is not a possessed object?
PIN
Which of the following is not a security product developer?
Adobe
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
ENERGY STAR
What is the term for a website that uses encryption techniques to protect its data?
Secure site
With which of the following do users choose which folders and files to include in a backup?
Selective backup
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
25
What is the term for a program that performs a repetitive task on a network?
bot
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
Information privacy
Which of the following terms means in a location separate from the computer site?
Off-site