Filters
Question type

Study Flashcards

COGNITIVE ASSESSMENT You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?


A) worm
B) rootkit
C) trojan horse
D) virus

Correct Answer

verifed

verified

A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.

Correct Answer

verifed

verified

PIN stands for personal identification ______.


A) number
B) name
C) network
D) note

Correct Answer

verifed

verified

The website for CERT/CC provides information about Internet security breaches.

Correct Answer

verifed

verified

The destructive event or prank a malware delivers is its ______.

Correct Answer

verifed

verified

A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.

Correct Answer

verifed

verified

With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.

Correct Answer

verifed

verified

______ is the process of converting data that is readable by humans into encoded characters.

Correct Answer

verifed

verified

If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?


A) Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
B) The company storing the data must protect against data loss due to physical disasters.
C) When transferring data over a network to the cloud, the data should be encrypted and authenticated.
D) Cloud storage companies have increased their privacy and security features in recent years.

Correct Answer

verifed

verified

A(n) ______ demands payment to stop an attack.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

An iris recognition system uses technology to read patterns in the user's ______.


A) eye
B) fingerprints
C) signature
D) face

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT If the web address of a website begins with https instead of http, what do you know about the website?


A) It likely is spoofed.
B) It is secure.
C) It provides security services and information.
D) It contains encrypted data.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is NOT true about two-step verification?


A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______.


A) criminal records
B) students' educational records
C) financial transactions
D) user names and passwords

Correct Answer

verifed

verified

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.


A) IP
B) EULA
C) electronic profile
D) code of conduct

Correct Answer

verifed

verified

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.


A) manipulation
B) engineering
C) hacking
D) misdirection

Correct Answer

verifed

verified

Which of the following is not a green computing recommendation?


A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following best describes a back door?


A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT You want to ensure your wireless network is secure. Which of the following should you NOT do?


A) Retain the default administrative password.
B) Choose a secure location for your wireless router.
C) Broadcast the SSID.
D) Enable an encryption method such as WPA2.

Correct Answer

verifed

verified

Showing 41 - 60 of 86

Related Exams

Show Answer