quiz 6 practice

1 March 2023
4.4 (185 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
All of the following are examples of malware EXCEPT ____.
answer
updates
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
question
Twitter is a ____ site.
answer
microblogging
question
The biggest challenge posed by Big Data is ____.
answer
developing software to analyze the massive amount of data
question
A popular encryption method used to protect data that travels over a wireless network is ____.
answer
WPA
question
Of the following, ____ is considered the most invasive.
answer
network behavioral targeting
question
A common form of authentication is a ____.
answer
password
question
Studying the way people use the web—what sites they visit, what products they buy, etc.—is an example of ____.
answer
one-to-one marketing
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
answer
US-CERT
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
question
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.
answer
Privacy Act of 1974
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
____ favor(s) an Internet that is open, with packets unexamined and unfiltered.
answer
Network neutrality
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources
answer
User
question
Of the following, ____ contains the most information about citizens of the United States.
answer
LexisNexis
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
question
A company called ____ provides digital certifications for web transactions.
answer
VeriSign
question
Which of the following is one realistic way to promote Internet security?
answer
Select strong passwords and change them regularly.
question
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy.
answer
transparent
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
question
Full transparency is a scenario in which surveillance and information are ____.
answer
easily available to every law-abiding member of a society
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
phishing
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phishing
question
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
answer
satellite imagery
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
____ is a form of traffic shaping.
answer
Throttling
question
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.
answer
analyze large amounts of data
question
____ can tell more about a person than all other kinds of electronic surveillance.
answer
Data mining
question
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
answer
network
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
question
The only time it is considered safe to send private information over a public wireless network is if it has ____.
answer
none of the above; a public wireless network is never safe for private information