Quiz 5 example #19602

18 September 2023
4.9 (233 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
A(n) ______ was originally a complimentary work for a computer enthusiast.
answer
hacker
question
A(n) ______ has a goal of destroying data or stealing information.
answer
cracker
question
A(n) ______ often uses prewritten hacking and cracking programs.
answer
script kiddie
question
A(n) ______ demands payment to stop an attack.
answer
cyberextortionist
question
Malware is short for ______ software.
answer
malicious
question
Another term for botnet is ______ army.
answer
zombie
question
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
answer
distributed
question
What is an audit trail?
answer
A file that records access attempts
question
A password ______ is a service that stores all of your account information securely.
answer
manager
question
Passcode is another term for a(n) ______.
answer
PIN
question
PIN stands for personal identification ______.
answer
number
question
An iris recognition system uses technology to read patterns in the user's ______.
answer
eye
question
What does a keygen do?
answer
Creates software registration numbers.
question
Which of the following is NOT a part of a typical single-user license agreement?
answer
You can rent or lease the software.
question
An encryption ______ is a set of steps that converts readable text into unreadable text.
answer
algorithm
question
A(n) ______ backup copies only the files that have changed since the last full backup.
answer
differential
question
Which of the following is not a green computing recommendation?
answer
Purchase low-efficiency equipment.
question
Common digital security risks include information theft and system failure.
answer
True
question
Software used to fight cybercriminals is called crimeware.
answer
False
question
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
answer
True
question
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
answer
True
question
A rootkit can be a backdoor.
answer
True
question
To protect files on your device's hard drive from hackers, turn on file and printer sharing.
answer
False
question
Two users can have the same email address.
answer
False
question
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
answer
False