Computer Essentials 9

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user’s account.

Select one:
True
False

False
Which of the following is the most widely used wireless network encryption for home wireless networks?

Select one:
a. WEP
b. WPE
c. WPA
d. WPA2

WPA2
People that collect and sell personal data are called _______.

Select one:
a. direct marketers
b. fund-raisers
c. information resellers
d. government agencies

Information resellers
_______ is concerned with protecting software and data from unauthorized tampering or damage.

Select one:
a. Data backup
b. Physical security
c. Disaster recovery plan
d. Data security

Data security
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

Select one:
a. Illusion of anonymity
b. Browser cache
c. History files
d. Privacy mode

Privacy mode
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

Select one:
a. Identity theft
b. Auction fraud
c. Cyberbullying
d. Snoopware

Cyberbullying
If copyright-protected music is uploaded to a website, it is legal to download it.

Select one:
True
False

False
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?

Select one:
a. Digital Millennium Copyright Act
b. Computer Abuse Amendments Act
c. The Gramm-Leach-Bliley Act
d. Computer Fraud and Abuse Act

Digital Millennium Copyright Act
This is a legal concept that gives content creators the right to control use and distribution of their work.

Select one:
a. Piracy
b. Ethics
c. Copyright
d. Privacy

Copyright
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

Select one:
a. Worm
b. Fake
c. Virus
d. Rogue

Rogue
Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.

Select one:
True
False

True
Information systems consist of people, procedures, software, hardware, data, and the Internet.

Select one:
True
False

True
Programs used to secretly record an individual’s activities on the Internet are called _______.

Select one:
a. spyware
b. cookies
c. sniffer programs
d. keystroke loggers

Spyware
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.

Select one:
True
False

True
Privacy concerns the collection and use of data about individuals.

Select one:
True
False

True
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

Select one:
True
False

True
The archiving and search features of the web make your online identity available indefinitely.

Select one:
True
False

True
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

Select one:
a. Spyware
b. Freeware
c. Employee-monitoring software
d. Cookies

Employee-monitoring software
Identity theft and mistaken identity are the same.

Select one:
True
False

False
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

Select one:
True
False

False
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

Select one:
True
False

True
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Select one:
a. Restriction
b. Security
c. Protection
d. Encryption

Encryption
These are used by advertisers to keep track of your web activity as you move from one site to the next.

Select one:
a. Web bugs
b. History files
c. First-party cookies
d. Third-party cookies

Third-party cookies
This law gives you the right to look at your personal records held by government agencies.

Select one:
a. Gramm-Leach-Bliley Act
b. Freedom of Information Act
c. Family Educational Rights and Privacy Act
d. Computer Fraud and Abuse Act
Feedback

Freedom of Information Act
Spy removal programs are designed to detect and remove various types of privacy threats.

Select one:
True
False

True
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Select one:
a. Malicious program
b. Internet scam
c. Theft
d. Data manipulation

Internet scam
Free computer games and free screen saver programs are typical carriers of _______.

Select one:
a. DoS
b. worms
c. viruses
d. Trojan horses

Trojan horses
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.

Select one:
True
False

True
It is highly likely that each one of us has an electronic profile created by information resellers.

Select one:
True
False

True
The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).

Select one:
True
False

True
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.

Select one:
True
False

False
Which of the following is not malware?

Select one:
a. Trojan horses
b. Viruses
c. Worms
d. Ad-Aware

Ad-Aware
Small data files that are deposited on a user’s hard disk when they visit a website are called _______.

Select one:
a. cookies
b. codes
c. cache
d. proxies

Cookies
Computer criminals that create and spread viruses are punished under this law.

Select one:
a. Gramm-Leach-Bliley Act
b. Freedom of Information Act
c. Family Educational Rights and Privacy Act
d. Computer Fraud and Abuse Act

Computer Fraud and Abuse Act
A(n) _______ acts as a security buffer between a corporation’s private network and all external networks.

Select one:
a. firewall
b. password
c. disaster recovery plan
d. virus checker

Firewall
Which among the following is a way to shut down an ISP or website?

Select one:
a. Denial of service attack
b. Viruses
c. Trojan horses
d. Worms

Denial of service attack
Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

Select one:
True
False

True
The most significant concerns for implementation of computer technology involve _______, security, and ethics.

Select one:
a. accuracy
b. property
c. privacy
d. access

Privacy
The essential element that controls how computers are used is a law.

Select one:
True
False

False
This type of computer criminal creates and distributes malicious programs.

Select one:
a. Employee
b. Hacker
c. Cracker
d. Keystroke logger

Cracker
Biometric scanning devices are used to scan employee identification cards.

Select one:
True
False

False
Which of the following is not a measure to protect computer security?

Select one:
a. Restricting access
b. Encrypting data
c. Copying data and storing it at a remote location
d. Keeping the same password on all systems consistently

Keeping the same password on all systems consistently
Corporations often use this to prevent copyright violations.

Select one:
a. Digital Millennium Copyright Act
b. Website encryption
c. Digital rights management (DRM)
d. Keystroke loggers

Digital rights management (DRM)
Which type of program would likely be used by investigators to record a potential suspects’ Internet activities?

Select one:
a. Cookie
b. Global positioning system
c. Keystroke logger
d. Web bug

Keystroke logger
A program that replicates itself and clogs computers and networks.

Select one:
a. Virus
b. Worm
c. Denial-of-service attack
d. Trojan horse

Worm
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.

Select one:
a. Encryption
b. Firewall
c. Password
d. Dictionary attack

Dictionary attack
A tracking cookie is used by an advertising company to keep track of your web activity as you move from one site to the next.

Select one:
True
False

True