intro to computer ch 9

Which type of program would likely be used by investigators to record a potential suspects’ Internet activities?

Cookie
Global positioning system
Keystroke logger
Web bug

keystroke logger
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

Spyware
Freeware
Employee-monitoring software
Cookies

Employee-monitoring software
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.

Encryption
Firewall
Password
Dictionary attack

Dictionary attack
Free computer games and free screen saver programs are typical carriers of _______.

DoS
worms
viruses
Trojan horses

trojan horses
This type of computer criminal creates and distributes malicious programs.

Employee
Hacker
Cracker
Keystroke logger

cracker
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Restriction
Security
Protection
Encryption

Encryption
This law gives you the right to look at your personal records held by government agencies.

Gramm-Leach-Bliley Act
Freedom of Information Act
Family Educational Rights and Privacy Act
Computer Fraud and Abuse Act

Freedom of Information Act
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

Illusion of anonymity
Browser cache
History files
Privacy mode

privacy mode
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

Worm
Fake
Virus
Rogue

Rogue
_______ is concerned with protecting software and data from unauthorized tampering or damage.

Data backup
Physical security
Disaster recovery plan
Data security

data security
A program that replicates itself and clogs computers and networks.

Virus
Worm
Denial-of-service attack
Trojan horse

worm
These are used by advertisers to keep track of your web activity as you move from one site to the next.

Web bugs
History files
First-party cookies
Third-party cookies

third-party cookies
Which of the following is the most widely used wireless network encryption for home wireless networks?

WEP
WPE
WPA
WPA2

WPA2
Small data files that are deposited on a user’s hard disk when they visit a website are called _______.

cookies
codes
cache
proxies

cookies
Which among the following is a way to shut down an ISP or website?

Denial of service attack
Viruses
Trojan horses
Worms

Denial of service attack
A(n) _______ acts as a security buffer between a corporation’s private network and all external networks.

firewall
password
disaster recovery plan
virus checker

firewall
Which of the following is not malware?

Trojan horses
Viruses
Worms
Ad-Aware

Ad-Aware
Corporations often use this to prevent copyright violations.

Digital Millennium Copyright Act
Website encryption
Digital rights management (DRM)
Keystroke loggers

Digital rights management (DRM)
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Malicious program
Internet scam
Theft
Data manipulation

internet scam
Computer criminals that create and spread viruses are punished under this law.

Gramm-Leach-Bliley Act
Freedom of Information Act
Family Educational Rights and Privacy Act
Computer Fraud and Abuse Act

Computer Fraud and Abuse Act
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

Identity theft
Auction fraud
Cyberbullying
Snoopware

cyberbullying
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away”

Digital Millennium Copyright Act
Computer Abuse Amendments Act
The Gramm-Leach-Bliley Act
Computer Fraud and Abuse Act

Digital Millennium Copyright Act
Programs used to secretly record an individual’s activities on the Internet are called _______.

spyware
cookies
sniffer programs
keystroke loggers

spyware
This is a legal concept that gives content creators the right to control use and distribution of their work.

Piracy
Ethics
Copyright
Privacy

copyright
Which of the following is not a measure to protect computer security?

Restricting access
Encrypting data
Copying data and storing it at a remote location
Keeping the same password on all systems consistently

Keeping the same password on all systems consistently
The most significant concerns for implementation of computer technology involve _______, security, and ethics.

accuracy
property
privacy
access

privacy
People that collect and sell personal data are called _______.

direct marketers
fund-raisers
information resellers
government agencies

information resellers