Computing Exam 3

28 June 2024
4.5 (74 reviews)
35 test answers
question
attackers who want to attack computers but lack the knowledge needed to do so.
answer
Script kiddies
question
Each of the following is a factor that causes repetitive strain injury (RSI) except uninterrupted intensity b. improper technique c. repetitive activity d. lack of restful sleep
answer
lack of restful sleep
question
A _______ is a malicious program that uses a computer network to replicate.
answer
worm
question
A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.
answer
spike
question
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
answer
true
question
When creating a strong password _____ is the most important element.
answer
length
question
is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
answer
encryption
question
Which of the following is not a web browser setting for managing cookies?
answer
Have all cookies automatically expire after 45 days.
question
address spoofing
answer
An attack that changes the device's address so that data is sent to the attacker's computer.
question
attackers
answer
An individual who launches attacks against other users and their computers, also known as a threat actor.
question
biometric security
answer
A way to verify your identity based on physical characteristics.
question
cyberterrorists
answer
An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.
question
data mining
answer
The process of sifting through big data to find the important questions that will yield fruitful results.
question
hactivists
answer
Attackers who are strongly motivated by principles or beliefs.
question
password manager
answer
A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.
question
social engineering
answer
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
question
Worm
answer
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
question
How can an attacker execute malware through a script?
answer
An attacker can attach a script to a program that you download which then infects your computer.
question
How does encryption work?
answer
It scrambles the information until the key is used to unscramble it.
question
How is a worm different from a Trojan?
answer
A worm spreads through a network, whereas a Trojan hides inside another program.
question
In which of the following real-life situations would it be useful to use a digital certificate?
answer
if you were signing a rental lease
question
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
answer
phishing
question
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
answer
ergonomics
question
Networks allow computers to share resources, such as hardware, software, data, and information.
answer
true
question
A DSL modem uses existing standard copper telephone wiring to send and receive digital data.
answer
true
question
Which of the following is not a common network topology? a. star network b. mesh network c. client/server network d. bus network
answer
client/server network
question
Which of the following is a private network used by organizations to communicate internally?
answer
intranet
question
Which describes a normal-looking, yet fraudulent Wi-Fi network?
answer
evil twin
question
Which government agency is responsible for releasing the rules surrounding Internet access?
answer
Federal Communications Commission (FCC)
question
The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.
answer
true
question
TCP/IP (Transmission Control Protocol/Internet Protocol)
answer
A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.
question
wide area network (WAN)
answer
Network that connects devices in a large geographic region, such as a multinational company or national retail chain.
question
wireless network key
answer
A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.
question
zombie
answer
A device infected with malware that an attacker uses to control the device remotely.
question
What is the approximate range of a personal area network?
answer
30 feet
1 of 35

Unlock all answers in this set

Unlock answers (31)
question
attackers who want to attack computers but lack the knowledge needed to do so.
answer
Script kiddies
question
Each of the following is a factor that causes repetitive strain injury (RSI) except uninterrupted intensity b. improper technique c. repetitive activity d. lack of restful sleep
answer
lack of restful sleep
question
A _______ is a malicious program that uses a computer network to replicate.
answer
worm
question
A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.
answer
spike
question
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
answer
true
question
When creating a strong password _____ is the most important element.
answer
length
question
is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
answer
encryption
question
Which of the following is not a web browser setting for managing cookies?
answer
Have all cookies automatically expire after 45 days.
question
address spoofing
answer
An attack that changes the device's address so that data is sent to the attacker's computer.
question
attackers
answer
An individual who launches attacks against other users and their computers, also known as a threat actor.
question
biometric security
answer
A way to verify your identity based on physical characteristics.
question
cyberterrorists
answer
An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.
question
data mining
answer
The process of sifting through big data to find the important questions that will yield fruitful results.
question
hactivists
answer
Attackers who are strongly motivated by principles or beliefs.
question
password manager
answer
A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.
question
social engineering
answer
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
question
Worm
answer
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
question
How can an attacker execute malware through a script?
answer
An attacker can attach a script to a program that you download which then infects your computer.
question
How does encryption work?
answer
It scrambles the information until the key is used to unscramble it.
question
How is a worm different from a Trojan?
answer
A worm spreads through a network, whereas a Trojan hides inside another program.
question
In which of the following real-life situations would it be useful to use a digital certificate?
answer
if you were signing a rental lease
question
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
answer
phishing
question
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
answer
ergonomics
question
Networks allow computers to share resources, such as hardware, software, data, and information.
answer
true
question
A DSL modem uses existing standard copper telephone wiring to send and receive digital data.
answer
true
question
Which of the following is not a common network topology? a. star network b. mesh network c. client/server network d. bus network
answer
client/server network
question
Which of the following is a private network used by organizations to communicate internally?
answer
intranet
question
Which describes a normal-looking, yet fraudulent Wi-Fi network?
answer
evil twin
question
Which government agency is responsible for releasing the rules surrounding Internet access?
answer
Federal Communications Commission (FCC)
question
The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.
answer
true
question
TCP/IP (Transmission Control Protocol/Internet Protocol)
answer
A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.
question
wide area network (WAN)
answer
Network that connects devices in a large geographic region, such as a multinational company or national retail chain.
question
wireless network key
answer
A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.
question
zombie
answer
A device infected with malware that an attacker uses to control the device remotely.
question
What is the approximate range of a personal area network?
answer
30 feet