ITE – Ch. 10

Antivirus programs look for a specific pattern of virus code. What is this pattern called?
virus signature
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
digital forensics
Define the term firewall.
hardware and/or software that protects a network’s resources from intrusion
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
malware
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a rootkit
Which of the following terms is used to describe a security measure that defines who can use a computer, when they can use it, and what actions they can take while using it?
an access control
Tendonitis is an example of what type of computer-related disorder?
RSI (Repetitive Strain Injury)
Define the term CAPTCHA.
a series of distorted characters that a user is required to enter correctly to continue using a Web site
What is the ENERGY STAR program designed to do?
to encourage manufacturers to create energy-efficient devices
*As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is known as what?
spam
What is an AUP (Acceptable Use Policy (Terms of Service)) intended to do?
outline computer activities for which the computer and network may or may not be used
Define the term botnet.
a group of compromised computers connected to a network that attacks other networks
*As shown in the accompanying figure, many Web sites require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
password
Which of the following statements is not true about wireless security?
WPA is the most recent network security standard and is more sophisticated than 802.11i.
The term, PIN, is an acronym for which of the following?
personal identification number
Which of the following kinds of software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure?
Intrusion detection
What happens during a DoS (denial of service) attack?
An unsuspecting computer is used to sent an influx of confusing data messages or useless network traffic.
Which of the following statements is not true about user names and passwords?
Multiuser systems typically provide users with their own passwords.
*As shown in the accompanying figure, all networked and online computer users should implement which of the following?
firewall solution
Which of the following statements is not true about hardware theft and vandalism?
Because of their weight and size, notebook computers are easy to conceal or secure, making them less vulnerable to theft.
What is an RTLS (real time location service) used for?
to track and identify the location of high-risk or high-value items
In order to safeguard your personal information, which of the following is recommended?
Clear your history file when you are finished browsing.
Which of the following statements is not true about backing up?
With a selective backup, all of the files in the computer automatically are chosen to be copied.
As related to the use of computers, which of the following terms is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others?
social engineering
Which of the following terms is used to describe a scam in which a Web site includes a button, image or link that contains a malicious program?
clickjacking
*To protect themselves from software piracy, software manufacturers issue an agreement like the one shown in the accompanying figure, which gives users the right to use the software. What is the term for this kind of agreement?
license agreement
If a password used on a site like the one shown in the accompanying figure is 4 characters long, what is the average time it would take a computer to discover the password?
1 second
Define the term, back door, as it refers to computer crime.
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts
Define social engineering as it pertains to computers.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Any illegal act involving a computer generally is referred to as which of the following?
computer crime
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a worm
As related to the use of computers, which of the following terms is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others?
social engineering
What kind of device, like the one in the accompanying figure, authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic?
biometric
Which of the following statements is NOT true about biometric devices?
With a touch screen, biometric payment can be used to make purchases over the Internet.
Define the term payload, as it pertains to computer crime.
the destructive event or prank the program is intended to deliver
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
spoofing
Some vendors or employers use a program to collect information about program usage or employees. What is this type of program called?
a spyware
When an antivirus program cannot remove an infection from a file, it moves the file to a separate area of the hard disk until the infection can be removed. What is this area called?
quarantine
Which of the following statements is not true about protecting yourself against computer viruses?
If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe to open it because you know the sender.
Which of the following terms is used to describe a scam in which a perpetrator attempts to obtain your personal and financial information via spoofing?
pharming
As shown in the accompanying figure, which of the following is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet?
firewall
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
an audit trail
Which of the following statements is not true about intellectual property rights?
The term fair use specifies how material may be used and helps to define intellectual property rights.
Define the term zombie.
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
What is an EULA intended to do?
license software for individual use