Computer Security and Ethics Exam. Computer software, network, security. Define cyberextortionist.

Which of the following is any event or action that could cause a loss of or damage to computer hardware,
software, data, information, or processing capability?
Computer Security Risk
Which of the following has the same intent as a cracker, but does not have the technical skills and
knowledge?
script kiddie
Which of the following is someone who uses e-mail as a vehicle for extortion?
cyberextortionist
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs
that act without a user’s knowledge and deliberately alter the computer’s operations?
malware
A particularly devastating type of DoS attack is which kind of DoS attack, in which multiple unsuspecting
computers are used to attack multiple computer networks?
distributed
Which of the following is a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network?
Spoofing
Which of the following software automatically analyzes all network traffic, assesses system vulnerabilities,
identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior
patterns or system breaches?
Intrusion detection
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
decryption
What is the term for the prolonged malfunction of a computer?
system failure
Which of the following terms means in a location separate from the computer site?
Offsite
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost,
damaged, or destroyed?
Backup
Some perpetrators use a technique in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. What is the term this technique?
War driving
Which of the following is an applied science devoted to incorporating comfort, efficiency, and safety into the
design of items in the workplace?
Ergonomics
Which of the following occurs when a computer consumes someone’s entire social life?
computer addiction
Which of the following category of rights are the rights to which creators are entitled for their work?
Intellectual property
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their
materials?
copyright
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which
of the following?
ethical
Andrew wants to start a company based off of his new idea. His idea involves a new technology that will
decrease the electric waste of computers and make them more efficient. This idea is known as?
Green Computing
Which of the following refers to the right of individuals and companies to deny or restrict the collection and
use of information about them?
information privacy
Jim wants something outside of the company’s network that controls which communications pass into the
network. What would you recommend for Jim?
Proxy Server
Many businesses use which of the following to limit employees’ Web access?
Content filtering
Which of the following is the process of restricting access to certain material on the Web?
Content filtering
Which of the following involves the use of computers to observe, record, and review an employee’s use of a
computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited?
Employee monitoring
Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts
Which term is used to describe software used by cybercriminals?
crimeware
Which of the following statements is not true about Internet and network attacks?
Information kept on an organization’s premises has a higher security risk than information
transmitted over networks.
What is the general term for programs that act without a user’s knowledge and deliberately alter the
computer’s operations?
malware
Define the term, payload, as it pertains to computer crime.
the destructive event or prank the program is intended to deliver
Which of the following statements is not true about protecting yourself against computer viruses?
If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe
to open it because you know the sender.
Define the term zombie.
a computer whose owner is unaware that the computer is being controlled remotely by an
outsider
What happens during a DDoS attack?
A zombie army is used to attack computers or computer networks.
Define the term back door, as it refers to computer crime.
a program or set of instructions that allows users to bypass security controls when
accessing a program, computer, or network
Which of the following refers to a technique intruders use to make their network or Internet transmission
appear legitimate to a victim computer or network?
spoofing
What is an EULA intended to do?
license software for individual
Which of the following statements is not true about user names and passwords?
Pass phrases are less secure because they contain words.
The term, PIN, is an acronym for which of the following?
Personal identification number
Which of the following statements is not true about biometric devices?
Biometric devices are an unreliable method of identification and notification.
Which of the following statements is not true about hardware theft and vandalism?
Home desktop computer users are especially vulnerable to hardware theft and vandalism.
Which of the following statements is not true about software theft?
A keygen distributes usernames and passwords to those who register their legally purchased copies of a software program.
What is a power surge?
when incoming electrical power increases more than five percent above normal volts
Which of the following statements is not true about backing up?
With a selective backup, all of the files in the computer automatically are chosen to be copied.
Which of the following statements is not true about wireless security?
WPA is the most recent network security standard and is more sophisticated than 802.11i.
You set up your computer so that your elbows are at about 90 degrees and your viewing distance is 18 to 28
inches. What scientific principle are you using to ensure your comfort and safety while using the computer?
ergonomics
Which of the following statements is not true about intellectual property rights?
The term fair use specifies how material may be used and helps to define intellectual property rights.
Which of the following terms refers to a written list of guidelines that might include rules that prevent
employees from using software illegally or using computers to steal?
an IT code of conduct
What is the purpose of a PUE?
to measure how much power enters the computer facility against the amount of power required to run the computers
Define social engineering as it pertains to computers.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
What term is used to describe the process of restricting access to certain material on the Web?
data mining
Which vendor is the world’s largest dedicated security technology company?
McAfee