E. Technology 5

1 October 2023
5 (175 reviews)
52 test answers

Unlock all answers in this set

Unlock answers (48)
question
True or False
answer
True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it's lost.
question
Displays unwanted advertisements in banners or pop-up windows on your computer
answer
Adware
question
Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission Internet advertising firms often use which of the following to collect information about users web browsing habits
answer
Spyware
question
Used by commercial Web site vendors to identify users and customize Web pages
answer
Cookie
question
Common forms include computer viruses, Trojan horses, and worms
answer
Malware
question
Computer taken over by hackers to perform malicious tasks across a network What is the term for a program that performs a repetitive task on a network
answer
Bot
question
Computer Generation
answer
First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer
question
Type of power supply/battery backup device that can prevent some forms of data loss
answer
uninterruptible
question
Type of hacker who intends serious harm through espionage, theft, or disruption of a network
answer
Black Hat
question
Events that account for almost half of total catastrophic data losses
answer
hurricanes and storms
question
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
answer
cyberterrorism
question
Type of hacker who wants to show off their skills and doesn't intend any serious damage
answer
White Hat
question
Type of malware that spreads without human interaction, sending itself out to everyone in your address book
answer
worm
question
Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information
answer
phishing
question
Type of malware that collects bits of data, like your surfing habits
answer
spyware
question
Type of malware that is spread when you distribute infected files, especially as e-mail attachments
answer
virus
question
A slowed down Wi-Fi connection can be the result of this
answer
piggybacking
question
Indication that a Web site is secure for shopping
answer
https://
question
Indication that a Web site is not secure
answer
misspelled company name
question
Online payment method to avoid
answer
money transfer
question
One secure method of online payment
answer
electronic wallet
question
The nation's fastest growing crime, where victims are unaware it's being committed until the damage is done
answer
Identity theft
question
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons
answer
Components of an online profile
question
A set of online communication practices and rules
answer
Netiquette
question
First step to take when being cyberbullied or cyberstalked
answer
Report abuse quickly
question
Items an identity thief can obtain to impersonate you
answer
Driver's license, birth certificate
question
True or False
answer
True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive
question
Legal or Illegal
answer
Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source
question
What occurs when someone steals personal or confidential information
answer
Information theft
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following
answer
ethical
question
In order to safeguard your personal information, which of the following is recommended
answer
Clear your history file when you are finished browsing
question
The term back door, as it refers to computer crime, is
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
question
Unless you want to allow others to follow your locations throughout the day, disable the
answer
GPS
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks
answer
digital forensics
question
Which of the following does your college use to verify your identity
answer
hand geometry system
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service
answer
voice verification system
question
Which of the following statements is not true about intellectual property rights
answer
The term fair use refers to the rights which creators are entitled for their work
question
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts
answer
an audit trail
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
answer
a worm
question
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer
answer
a rootkit
question
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program
answer
clickjacking
question
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender
answer
a digital signature
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action
answer
cracker
question
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process
answer
product activation
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited
answer
employee monitoring
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
answer
Backup
question
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
answer
Spoofing
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
answer
Digital Security risk
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate
answer
Digital
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them
answer
information privacy
question
True
answer
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages
question
False
answer
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development