CIS Chapter 5

Which of the following copies all of the files in a computer?

full backup
incremental backup
differential backup
selective backup

full backup
What term is used to describe the process of restricting access to certain material on the web?
content filtering
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

keygens
indices
backdoors
macros

macros
With which of the following do users choose which folders and files to include in a backup?

full backup
incremental backup
differential backup
selective backup

selective backup
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Electronic Communications Privacy Act (ECPA)
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

Electronic Communications Privacy Act (ECPA)
Fair Credit Reporting Act
Computer Fraud and Abuse Act
Computer Matching and Privacy Protection Act

Electronic Communications Privacy Act (ECPA)
Many businesses use which of the following to limit employees’ web access?
content filtering
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

war driving
spitting
clickjacking
spimming

clickjacking
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
product activation
Which of the following can transmit germs?

iris recognition systems
digital forensics systems
face recognition systems
hand geometry systems

hand geometry systems
Which of the following does a new federal laboratory use in its high security areas?

signature verification system
digital forensics system
hand geometry system
iris recognition system

iris recognition ssytem
The term firewall is
hardware and/or software that protects a network’s resources from intrusion
Which of the following statements is not a safeguard against the failure of hardware?

surge protectors
fault-tolerant computers
device-tracking apps
UPS

device-tracking apps
Many websites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
password
Which term is used to describe software used by cybercriminals?
crimeware
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

rebuking
spoofing
transmitting
victimizing

spoofing
Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts
any illegal act involving a computer
a type of gaming software that simulates criminal acts
using the Internet to apprehend and prosecute criminals

online or Internet-based illegal acts
Which of the following is an authorized person or company that issues and verifies digital certificates?

certificate authority
certificate agency
certificate office
certificate bureau

certificate authority
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

spam
spit
phishing
spyware

phishing
The term, payload, as it pertains to computer crime, is defined as
the destructive event or prank the program is intended to deliver
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

digital forensics system
voice verification system
iris recognition system
hand geometry system

voice verification system
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
They restore the files
Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure?

hacker
script kiddie
cyberextortionist
cyberterrorist

cyberextortionist
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

a software license
an IT code of conduct
digital rights management
fair use

an IT code of conduct
Which of the following statements is not true about backing up?

*Backup programs are available from many sources.
*Continuous data protection typically is used only by large enterprises.
*With a selective backup, all of the files in the computer automatically are chosen to be copied.
*A backup is a duplicate of a file, program, or disk.

With a selective backup, all of the files in the computer automatically are chosen to be copied.
Which of the following is the process of restricting access to certain material on the web?

text remastering
content filtering
indexing
material masking

content filtering
Which of the following is not a possessed object?

PIN
badge
smart card
key

PIN
Social engineering, as it pertains to computers, is
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Into which of the following kinds of ports do external fingerprint readers plug?

parallel
MIDI
USB
serial

USB
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?

manager filtering
employee monitoring
job spamming
employee indexing

employee monitoring
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
site
What is the term for a program that performs a repetitive task on a network?
bot
Websites use which of the following to keep track of items in a user’s shopping cart?

session cookie
zombie
adware
shopping bot

session cookie
Internet advertising firms often use which of the following to collect information about users web browsing habits?

comware
postware
spyware
billware

spyware
The term, PIN, is an acronym for what?
personal identification number
The term CAPTCHA is
a series of distorted characters that a user is required to enter correctly to continue using a website
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
CAPTCHA
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

assigned
secure
protected
digital

digital
Which of the following is, a small text file that a web server stores on a user’s computer?

worm
spike
cookie
payload

cookie
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

ENERGY STAR
SECURE ELECTRONICS
ACCEPTABLE USE
GREEN COMPUTING

ENERGY STAR
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

a decipher module
a translation tool
an encryption algorithm
a decryption key

an encryption algorithm
Which of the following statements is not true about Internet and network attacks?

1. No central administrator is present on the Internet.
2. It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
3. Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
4. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

spoofing
phishing
veiling
costuming

spoofing
The term, zombie, is
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
The term, botnet, mean
a group of compromised computers connected to a network that attacks other networks
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?

sending spam via email
spreading viruses
committing a distributed denial of service attack
authoring ActiveX scripts

authoring ActiveX scripts
The term back door, as it refers to computer crime, is
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
An IT code of conduct is a written guideline that helps determine whether a specific computer action is
ethical
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

restored file
bot
IP file
backup

backup
Which of the following statements is not true about intellectual property rights?

1. The term fair use refers to the rights which creators are entitled for their work.
2. Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
3. A copyright protects any tangible form of expression.
4. Digital rights management is a strategy designed to prevent illegal distribution of digital content.

The term fair use refers to the rights which creators are entitled for their work.
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
decryption
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

a certificate authority
a digital signature
an encryption key
a hash

a digital signature
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
network
Which of the following is the least likely motive for a DDoS?

political anger
spoofing
extortion
negative recognition

spoofing
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
substitution
How long can digital certificates be valid?
two years
Which of the following can be used to create a software registration number, sometimes illegally?
BSA
decryption key
keygen
public key
keygen
What is another name for public key encryption?

controlled key encryption
virtual key encryption
asymmetric key encryption
secure key encryption

asymmetric key encryption