Deck 9: Discovering Computers: Computer Security and Safety, Ethics, and Privacy

ملء الشاشة (f)
exit full mode
سؤال
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

A)Rebuking
B)Spoofing
C)Transmitting
D)Victimizing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
If an antivirus program cannot remove an infection, it often ____.

A)quarantines the infected file
B)reports the user computer
C)disables the drive the file is on
D)removes the user from its registry
سؤال
In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.

A)Javascript
B)macros
C)antivirus definitions
D)antispyware definitions
سؤال
Many systems implement access controls using a two-phase process called ____.

A)access or deny
B)identification and authentication
C)access and approval
D)identification and approval
سؤال
A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
سؤال
____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

A)An anti-spam program
B)E-mail encryption
C)An antivirus program
D)E-mail filtering
سؤال
<strong>  ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.</strong> A)Violation B)Password C)Intrusion D)Traffic <div style=padding-top: 35px> ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.

A)Violation
B)Password
C)Intrusion
D)Traffic
سؤال
<strong>  All networked and online computer users should implement a ____, like the one shown in the accompanying figure.</strong> A)firewall solution B)back door C)DoS attack D)all of the above <div style=padding-top: 35px> All networked and online computer users should implement a ____, like the one shown in the accompanying figure.

A)firewall solution
B)back door
C)DoS attack
D)all of the above
سؤال
A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A)security
B)liability
C)terrorism
D)network
سؤال
____ is a server outside a company's network that controls which communications pass into the company's network.

A)A firewall
B)Intrusion detection software
C)A proxy server
D)An audit trail
سؤال
A ____ is someone who uses e-mail as a vehicle for extortion.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
سؤال
A virus hoax often is in the form of a(n)____.

A)photo attachment
B)newsletter
C)chain letter
D)advertisement
سؤال
Which of the following is not true of intrusion detection software?

A)It is complex.
B)It is difficult to interpret.
C)It is inexpensive.
D)It is not designed for home use.
سؤال
A ____ is the destructive event or prank malware is intended to deliver.

A)payload
B)hoax
C)spoof
D)rebuke
سؤال
The term ____ refers to online or Internet-based illegal acts.

A)malware
B)cyberthreat
C)cybercrime
D)cyberextortion
سؤال
All of the following are common ways computers become infected with malware, except ____.

A)opening infected files
B)running an infected program
C)booting the computer with infected removable media inserted in a drive or plugged in a port
D)installing a software package from a CD
سؤال
A ____ has the same intent as a cracker but does not have the technical skills and knowledge.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
سؤال
<strong>  As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.</strong> A)quarantine B)biometric device C)firewall D)router <div style=padding-top: 35px> As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.

A)quarantine
B)biometric device
C)firewall
D)router
سؤال
Currently, more than ____ Web sites can infect your computer with known viruses, worms, Trojan horses, rootkits, and other malware programs.

A)11,000
B)22,000
C)151,000
D)300,000
سؤال
Any illegal act involving a computer generally is referred to as a ____.

A)cyberthreat
B)computer crime
C)malware
D)hoax
سؤال
Social engineers can obtain information by ____.

A)snooping around computers looking for openly displayed confidential information
B)watching or filming people dialing telephone numbers or using ATMs
C)sifting through company dumpsters
D)all of the above
سؤال
<strong>  As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.</strong> A)term B)link C)name D)key <div style=padding-top: 35px> As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

A)term
B)link
C)name
D)key
سؤال
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

A)rights
B)acceptable use
C)restrictions
D)privacy
سؤال
<strong>  If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.</strong> A)1 second B)30 seconds C)7 minutes D)2 hours <div style=padding-top: 35px> If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.

A)1 second
B)30 seconds
C)7 minutes
D)2 hours
سؤال
<strong>  A(n)____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.</strong> A)authentication B)personal C)identification D)biometric <div style=padding-top: 35px> A(n)____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

A)authentication
B)personal
C)identification
D)biometric
سؤال
Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.

A)theft
B)extortion
C)piracy
D)terrorism
سؤال
<strong>  As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.</strong> A)PIN B)password C)secure key D)passterm <div style=padding-top: 35px> As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.

A)PIN
B)password
C)secure key
D)passterm
سؤال
A ____ protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment.

A)Joule
B)spike
C)surge
D)hash
سؤال
<strong>  To protect themselves from software piracy, software manufacturers issue a(n)____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.</strong> A)intellectual property B)license C)access D)copyright <div style=padding-top: 35px> To protect themselves from software piracy, software manufacturers issue a(n)____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.

A)intellectual property
B)license
C)access
D)copyright
سؤال
____ occurs when someone steals personal or confidential information.

A)Plagiarism
B)Decryption
C)Information theft
D)Cyberpiracy
سؤال
Which of the following is an example of a possessed object?

A)user name and password
B)face recognition systems
C)badges and keys
D)fingerprint scanner
سؤال
____ theft is the act of stealing computer equipment.

A)Hardware
B)Cyber
C)SMS
D)Software
سؤال
A(n)____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

A)TSR
B)RSI
C)RIT
D)TRI
سؤال
____ can lead to system failure.

A)Aging hardware
B)Natural disasters, such as fires, floods, or hurricanes
C)Errors in computer programs
D)All of the above
سؤال
Which of the following is not an example of a biometric device?

A)smart card
B)face recognition system
C)hand geometry system
D)fingerprint scanner
سؤال
Computer ____ are the moral guidelines that govern the use of computers and information systems.

A)logistics
B)mechanics
C)ethics
D)rights
سؤال
<strong>  As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.</strong> A)spyware B)spam C)cookies D)adware <div style=padding-top: 35px> As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.

A)spyware
B)spam
C)cookies
D)adware
سؤال
Which method of encryption inserts characters between existing characters?

A)transposition
B)substitution
C)expansion
D)compaction
سؤال
A(n)____ is the prolonged malfunction of a computer.

A)hardware vandalism
B)system failure
C)unauthorized access
D)software theft
سؤال
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

A)DoS
B)social engineering
C)DRM
D)scamming
سؤال
Modified Multiple Choice Employee monitoring involves the use of computers to observe, record, and review an employee's ____.

A)e-mail messages
B)phone calls
C)keyboard activity
D)Web sites visited
سؤال
Computer crime refers to online or Internet-based illegal acts.
سؤال
Shrink-wrapped software from major developers does not need to be scanned for infections.
سؤال
A digital certificate is an encrypted code attached to an electronic message to verify the identity of the message sender.
سؤال
Modified Multiple Choice Digital forensics analysis involves the examination of ____.

A)computer media
B)servers
C)data and log files
D)networks
سؤال
Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and access files on the remote computer.
سؤال
Encrypted data is called plaintext.
سؤال
  A fingerprint reader is an example of a biometric system, as shown in the accompanying figure.<div style=padding-top: 35px>
A fingerprint reader is an example of a biometric system, as shown in the accompanying figure.
سؤال
Modified Multiple Choice ____ is a category of perpetrator of cybercrime and other similar intrusions.

A)Hacker
B)Script kiddie
C)Cracker
D)Corporate spy
سؤال
  Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.<div style=padding-top: 35px>
Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.
سؤال
The substitution encryption method switches the order of characters.
سؤال
Most antivirus programs do not provide updated virus signature files for users.
سؤال
Modified Multiple Choice Intellectual property (IP)covers ____.

A)natural resources
B)art
C)ideas
D)processes
سؤال
A cyberextortionist is someone who uses the Internet or a network to destroy or damage computers for political reasons.
سؤال
Modified Multiple Choice Adware is a program that displays an online advertisement in a banner or pop-up window on ____.

A)Telnet sessions
B)e-mail
C)Web pages
D)FTP transfers
سؤال
Companies should review successful access attempts for irregularities.
سؤال
  Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.<div style=padding-top: 35px>
Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.
سؤال
The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities.
سؤال
A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
سؤال
The term, cracker, originally was a complimentary word for a computer enthusiast.
سؤال
A(n)____________________ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
سؤال
Physical access controls, such as locked doors and windows, usually are adequate to protect computer equipment from hardware theft.
سؤال
The term, ____________________, refers to online or Internet-based illegal acts.
سؤال
  Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.<div style=padding-top: 35px>
Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.
سؤال
An encryption key often uses a combination of encryption methods.
سؤال
If computer equipment is networked, a single power disturbance can damage multiple systems.
سؤال
A(n)____________________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
سؤال
A(n)____________________ is a program that hides within or looks like a legitimate program.
سؤال
For visually impaired users, the CAPTCHA text can be read aloud.
سؤال
  With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.<div style=padding-top: 35px>
With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.
سؤال
  If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one.<div style=padding-top: 35px>
If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one.
سؤال
With a selective backup, users decide which folders and files to include in a backup.
سؤال
  Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.<div style=padding-top: 35px>
Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.
سؤال
Copyright law gives the public fair use to copyrighted material.
سؤال
Wireless access poses additional security risks.
سؤال
If you disable cookie use, you will not be able to use many of the e-commerce Web sites.
سؤال
A(n)____________________ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
سؤال
To access a wireless network, perpetrators must be in the range of the wireless network.
سؤال
Electrical power variation is one of the least common causes of system failure.
سؤال
Spam is a program placed on a computer without the user's knowledge that secretly collects information about the user.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/112
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Discovering Computers: Computer Security and Safety, Ethics, and Privacy
1
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

A)Rebuking
B)Spoofing
C)Transmitting
D)Victimizing
B
2
If an antivirus program cannot remove an infection, it often ____.

A)quarantines the infected file
B)reports the user computer
C)disables the drive the file is on
D)removes the user from its registry
A
3
In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.

A)Javascript
B)macros
C)antivirus definitions
D)antispyware definitions
B
4
Many systems implement access controls using a two-phase process called ____.

A)access or deny
B)identification and authentication
C)access and approval
D)identification and approval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

A)An anti-spam program
B)E-mail encryption
C)An antivirus program
D)E-mail filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
7
<strong>  ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.</strong> A)Violation B)Password C)Intrusion D)Traffic ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.

A)Violation
B)Password
C)Intrusion
D)Traffic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
8
<strong>  All networked and online computer users should implement a ____, like the one shown in the accompanying figure.</strong> A)firewall solution B)back door C)DoS attack D)all of the above All networked and online computer users should implement a ____, like the one shown in the accompanying figure.

A)firewall solution
B)back door
C)DoS attack
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
9
A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A)security
B)liability
C)terrorism
D)network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ is a server outside a company's network that controls which communications pass into the company's network.

A)A firewall
B)Intrusion detection software
C)A proxy server
D)An audit trail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ____ is someone who uses e-mail as a vehicle for extortion.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
12
A virus hoax often is in the form of a(n)____.

A)photo attachment
B)newsletter
C)chain letter
D)advertisement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not true of intrusion detection software?

A)It is complex.
B)It is difficult to interpret.
C)It is inexpensive.
D)It is not designed for home use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ is the destructive event or prank malware is intended to deliver.

A)payload
B)hoax
C)spoof
D)rebuke
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
15
The term ____ refers to online or Internet-based illegal acts.

A)malware
B)cyberthreat
C)cybercrime
D)cyberextortion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
16
All of the following are common ways computers become infected with malware, except ____.

A)opening infected files
B)running an infected program
C)booting the computer with infected removable media inserted in a drive or plugged in a port
D)installing a software package from a CD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
17
A ____ has the same intent as a cracker but does not have the technical skills and knowledge.

A)hacker
B)script kiddie
C)cyberextortionist
D)cyberterrorist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
18
<strong>  As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.</strong> A)quarantine B)biometric device C)firewall D)router As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.

A)quarantine
B)biometric device
C)firewall
D)router
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
19
Currently, more than ____ Web sites can infect your computer with known viruses, worms, Trojan horses, rootkits, and other malware programs.

A)11,000
B)22,000
C)151,000
D)300,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
20
Any illegal act involving a computer generally is referred to as a ____.

A)cyberthreat
B)computer crime
C)malware
D)hoax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
21
Social engineers can obtain information by ____.

A)snooping around computers looking for openly displayed confidential information
B)watching or filming people dialing telephone numbers or using ATMs
C)sifting through company dumpsters
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
22
<strong>  As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.</strong> A)term B)link C)name D)key As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

A)term
B)link
C)name
D)key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
23
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

A)rights
B)acceptable use
C)restrictions
D)privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
24
<strong>  If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.</strong> A)1 second B)30 seconds C)7 minutes D)2 hours If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.

A)1 second
B)30 seconds
C)7 minutes
D)2 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
25
<strong>  A(n)____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.</strong> A)authentication B)personal C)identification D)biometric A(n)____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

A)authentication
B)personal
C)identification
D)biometric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
26
Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.

A)theft
B)extortion
C)piracy
D)terrorism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
27
<strong>  As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.</strong> A)PIN B)password C)secure key D)passterm As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.

A)PIN
B)password
C)secure key
D)passterm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ____ protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment.

A)Joule
B)spike
C)surge
D)hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
29
<strong>  To protect themselves from software piracy, software manufacturers issue a(n)____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.</strong> A)intellectual property B)license C)access D)copyright To protect themselves from software piracy, software manufacturers issue a(n)____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.

A)intellectual property
B)license
C)access
D)copyright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ occurs when someone steals personal or confidential information.

A)Plagiarism
B)Decryption
C)Information theft
D)Cyberpiracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is an example of a possessed object?

A)user name and password
B)face recognition systems
C)badges and keys
D)fingerprint scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ theft is the act of stealing computer equipment.

A)Hardware
B)Cyber
C)SMS
D)Software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

A)TSR
B)RSI
C)RIT
D)TRI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ can lead to system failure.

A)Aging hardware
B)Natural disasters, such as fires, floods, or hurricanes
C)Errors in computer programs
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is not an example of a biometric device?

A)smart card
B)face recognition system
C)hand geometry system
D)fingerprint scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
36
Computer ____ are the moral guidelines that govern the use of computers and information systems.

A)logistics
B)mechanics
C)ethics
D)rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
37
<strong>  As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.</strong> A)spyware B)spam C)cookies D)adware As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.

A)spyware
B)spam
C)cookies
D)adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which method of encryption inserts characters between existing characters?

A)transposition
B)substitution
C)expansion
D)compaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n)____ is the prolonged malfunction of a computer.

A)hardware vandalism
B)system failure
C)unauthorized access
D)software theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
40
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

A)DoS
B)social engineering
C)DRM
D)scamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
41
Modified Multiple Choice Employee monitoring involves the use of computers to observe, record, and review an employee's ____.

A)e-mail messages
B)phone calls
C)keyboard activity
D)Web sites visited
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
42
Computer crime refers to online or Internet-based illegal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
43
Shrink-wrapped software from major developers does not need to be scanned for infections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
44
A digital certificate is an encrypted code attached to an electronic message to verify the identity of the message sender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
45
Modified Multiple Choice Digital forensics analysis involves the examination of ____.

A)computer media
B)servers
C)data and log files
D)networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
46
Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and access files on the remote computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
47
Encrypted data is called plaintext.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
48
  A fingerprint reader is an example of a biometric system, as shown in the accompanying figure.
A fingerprint reader is an example of a biometric system, as shown in the accompanying figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
49
Modified Multiple Choice ____ is a category of perpetrator of cybercrime and other similar intrusions.

A)Hacker
B)Script kiddie
C)Cracker
D)Corporate spy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
50
  Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.
Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
51
The substitution encryption method switches the order of characters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
52
Most antivirus programs do not provide updated virus signature files for users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
53
Modified Multiple Choice Intellectual property (IP)covers ____.

A)natural resources
B)art
C)ideas
D)processes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
54
A cyberextortionist is someone who uses the Internet or a network to destroy or damage computers for political reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
55
Modified Multiple Choice Adware is a program that displays an online advertisement in a banner or pop-up window on ____.

A)Telnet sessions
B)e-mail
C)Web pages
D)FTP transfers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
56
Companies should review successful access attempts for irregularities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
57
  Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.
Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
58
The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
59
A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
60
The term, cracker, originally was a complimentary word for a computer enthusiast.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
61
A(n)____________________ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
62
Physical access controls, such as locked doors and windows, usually are adequate to protect computer equipment from hardware theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
63
The term, ____________________, refers to online or Internet-based illegal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
64
  Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.
Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
65
An encryption key often uses a combination of encryption methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
66
If computer equipment is networked, a single power disturbance can damage multiple systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
67
A(n)____________________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
68
A(n)____________________ is a program that hides within or looks like a legitimate program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
69
For visually impaired users, the CAPTCHA text can be read aloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
70
  With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.
With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
71
  If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one.
If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
72
With a selective backup, users decide which folders and files to include in a backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
73
  Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.
Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
74
Copyright law gives the public fair use to copyrighted material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
75
Wireless access poses additional security risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
76
If you disable cookie use, you will not be able to use many of the e-commerce Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
77
A(n)____________________ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
78
To access a wireless network, perpetrators must be in the range of the wireless network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
79
Electrical power variation is one of the least common causes of system failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
80
Spam is a program placed on a computer without the user's knowledge that secretly collects information about the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 112 في هذه المجموعة.