Deck 9: Network and Internet Security

Full screen (f)
exit full mode
Question
It is important to select strong passwords and change them frequently.
Use Space or
up arrow
down arrow
to flip the card.
Question
Denial of service attacks are usually of insignificant cost in terms of business lost.
Question
When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.
Question
The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
Question
Biometric authentication uses information that an individual should know or can easily remember.
Question
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
Question
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
Question
Internet offer scams include a wide range of scams offered through Web sites or unsolicited e-mails.
Question
Wi-Fi security features work by default.
Question
Private key encryption is also called symmetric key encryption.
Question
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
Question
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
Question
Many Internet security concerns today can be categorized as cybercrimes.
Question
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
Question
Unauthorized use involves using a computer resource for unauthorized activities.
Question
Like a computer virus, a computer worm infects other computer files to replicate itself.
Question
Information used in identity theft can be obtained by skimming or via social engineering.
Question
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Question
A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.
Question
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
Question
Identification systems determine whether or not the person attempting access is actually who he or she claims to be.
Question
Cuts or other changes to a finger may prevent access via a(n) keystroke reader .
Question
____ refers to the act of breaking into a computer or network.

A) Spamming
B) Phishing
C) Hacking
D) Spoofing
Question
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.
Question
USB security keys are also called USB security tokens .
Question
Phishing schemes use legitimate-looking e-mails to trick users into providing private information.
Question
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
Question
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there.
Question
Numeric passwords are also referred to passcodes .
Question
A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.
Question
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer.
Question
____ are sets of tools that allow hackers to access a system.

A) Toolkits
B) Hackkits
C) Crimekits
D) Rootkits
Question
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used.
Question
Computer spyware includes any illegal act involving a computer.
Question
AntiDoS software is used to detect and eliminate computer viruses and other types of malware.
Question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

A) spoofing
B) phishing
C) spamming
D) war driving
Question
Computer crime is sometimes referred to as ____.

A) hacking
B) cybercrime
C) cyberstalking
D) spoofing
Question
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

A) Spoofing
B) Unauthorized access
C) Phishing
D) Vandalizing
Question
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
Question
In spoofing , terrorists launch attacks via the Internet.
Question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A) Touch object
B) Possessed object
C) Two-factor
D) Biometric
Question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A) laptop private network
B) USB private network
C) tunnel private network
D) virtual private network
Question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

A) Usernames
B) PINs
C) Passwords
D) Codes
Question
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A) e-cons
B) e-scams
C) dot frauds
D) dot cons
Question
<strong>  ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer.</strong> A) Data-leakage prevention B) Device authentication C) Professional firewall D) Network quarantine <div style=padding-top: 35px> ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer.

A) Data-leakage prevention
B) Device authentication
C) Professional firewall
D) Network quarantine
Question
____ are acts of malicious destruction to a computer or computer resource.

A) Phishing attacks
B) Blocking attacks
C) Computer sabotage
D) Spoofing attacks
Question
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A) Trojan horse
B) computer worm
C) computer insect
D) computer bug
Question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

A) phish
B) virus
C) bot
D) link
Question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

A) war driving
B) Wi-Fi piggybacking
C) Wi-Fi worming
D) denial of service
Question
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

A) botherders
B) botnets
C) passes
D) tokens
Question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) firewall
C) hub
D) bridge
Question
____ identify users by a particular unique biological characteristic.

A) Possessed object access systems
B) Password access systems
C) Possessed knowledge access systems
D) Biometric access systems
Question
____ is a generic term that refers to any type of malicious software.

A) Spamware
B) Malware
C) Spyware
D) Badware
Question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A) virus definitions
B) upgrades
C) software versions
D) virus reports
Question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A) virus
B) software
C) worm
D) hacker
Question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A) spider
B) server
C) client
D) bot
Question
____ uses a single secret key to both encrypt and decrypt the file or message.

A) Private key encryption
B) Asymmetric key encryption
C) Public key encryption
D) Synchronous key encryption
Question
One emerging type of Trojan horse is called a ____-Access Trojan.

A) Demote
B) Remote
C) Control
D) Hacker
Question
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A) CryptMail
B) QuietMail
C) HushMail
D) PrivateMail
Question
Like a computer virus, a ____ is a malicious program designed to cause damage.

A) computer worm
B) scam
C) phish
D) computer bug
Question
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

A) botnet
B) firewall
C) IPS
D) encryption algorithm
Question
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

A) IPS
B) firewall
C) antivirus software
D) RAM
Question
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

A) Spams
B) Identity theft
C) Remote access
D) Software theft
Question
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Question
A(n) ____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Question
Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
Question
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A) Heath Insurance Portability and Accountability Act (HIPAA)
B) PROTECT Act
C) Homeland Security Act of 2002
D) National Information Infrastructure Protection Act
Question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A) Framing
B) Fishing
C) Pharming
D) Farming
Question
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A) EV B) SK C) SQL D) HTTPS <div style=padding-top: 35px> The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A) EV
B) SK
C) SQL
D) HTTPS
Question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A) typosquatting
B) spamming
C) DoS attacks
D) identity theft
Question
The best protection against many dot cons is ____.

A) your ISP
B) updated operating systems
C) antivirus programs
D) common sense
Question
Repeated threats or other harassment carried out online between adults is referred to as ____.

A) cyberstalking
B) computer sabotage
C) cyberterrorism
D) phishing
Question
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.

A) Trojan horse
B) worm
C) virus
D) bot
Question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A) Data theft
B) Information theft
C) Identity theft
D) Database theft
Question
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

A) spider
B) bot
C) virus
D) spam
Question
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

A) Sarbanes-Oxley Act
B) USA Patriot Act
C) Identity Theft and Assumption Deterrence Act of 1998
D) No Electronic Theft (NET) Act
Question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

A) private
B) public
C) organizational
D) token
Question
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
Question
____________________ includes any illegal act involving a computer.
Question
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

A) private key
B) e-mail address
C) public key
D) password
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Network and Internet Security
1
It is important to select strong passwords and change them frequently.
True
2
Denial of service attacks are usually of insignificant cost in terms of business lost.
False
3
When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.
False
4
The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Biometric authentication uses information that an individual should know or can easily remember.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Internet offer scams include a wide range of scams offered through Web sites or unsolicited e-mails.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Wi-Fi security features work by default.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Private key encryption is also called symmetric key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Many Internet security concerns today can be categorized as cybercrimes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Unauthorized use involves using a computer resource for unauthorized activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Like a computer virus, a computer worm infects other computer files to replicate itself.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Information used in identity theft can be obtained by skimming or via social engineering.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Identification systems determine whether or not the person attempting access is actually who he or she claims to be.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Cuts or other changes to a finger may prevent access via a(n) keystroke reader .
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
____ refers to the act of breaking into a computer or network.

A) Spamming
B) Phishing
C) Hacking
D) Spoofing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
USB security keys are also called USB security tokens .
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Phishing schemes use legitimate-looking e-mails to trick users into providing private information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Numeric passwords are also referred to passcodes .
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
____ are sets of tools that allow hackers to access a system.

A) Toolkits
B) Hackkits
C) Crimekits
D) Rootkits
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Computer spyware includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
AntiDoS software is used to detect and eliminate computer viruses and other types of malware.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

A) spoofing
B) phishing
C) spamming
D) war driving
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Computer crime is sometimes referred to as ____.

A) hacking
B) cybercrime
C) cyberstalking
D) spoofing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

A) Spoofing
B) Unauthorized access
C) Phishing
D) Vandalizing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
In spoofing , terrorists launch attacks via the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A) Touch object
B) Possessed object
C) Two-factor
D) Biometric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A) laptop private network
B) USB private network
C) tunnel private network
D) virtual private network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

A) Usernames
B) PINs
C) Passwords
D) Codes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A) e-cons
B) e-scams
C) dot frauds
D) dot cons
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
<strong>  ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer.</strong> A) Data-leakage prevention B) Device authentication C) Professional firewall D) Network quarantine ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee's computer.

A) Data-leakage prevention
B) Device authentication
C) Professional firewall
D) Network quarantine
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
____ are acts of malicious destruction to a computer or computer resource.

A) Phishing attacks
B) Blocking attacks
C) Computer sabotage
D) Spoofing attacks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A) Trojan horse
B) computer worm
C) computer insect
D) computer bug
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

A) phish
B) virus
C) bot
D) link
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

A) war driving
B) Wi-Fi piggybacking
C) Wi-Fi worming
D) denial of service
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

A) botherders
B) botnets
C) passes
D) tokens
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) firewall
C) hub
D) bridge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
____ identify users by a particular unique biological characteristic.

A) Possessed object access systems
B) Password access systems
C) Possessed knowledge access systems
D) Biometric access systems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
____ is a generic term that refers to any type of malicious software.

A) Spamware
B) Malware
C) Spyware
D) Badware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A) virus definitions
B) upgrades
C) software versions
D) virus reports
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A) virus
B) software
C) worm
D) hacker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A) spider
B) server
C) client
D) bot
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
____ uses a single secret key to both encrypt and decrypt the file or message.

A) Private key encryption
B) Asymmetric key encryption
C) Public key encryption
D) Synchronous key encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
One emerging type of Trojan horse is called a ____-Access Trojan.

A) Demote
B) Remote
C) Control
D) Hacker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A) CryptMail
B) QuietMail
C) HushMail
D) PrivateMail
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Like a computer virus, a ____ is a malicious program designed to cause damage.

A) computer worm
B) scam
C) phish
D) computer bug
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

A) botnet
B) firewall
C) IPS
D) encryption algorithm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

A) IPS
B) firewall
C) antivirus software
D) RAM
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

A) Spams
B) Identity theft
C) Remote access
D) Software theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A) Heath Insurance Portability and Accountability Act (HIPAA)
B) PROTECT Act
C) Homeland Security Act of 2002
D) National Information Infrastructure Protection Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A) Framing
B) Fishing
C) Pharming
D) Farming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A) EV B) SK C) SQL D) HTTPS The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A) EV
B) SK
C) SQL
D) HTTPS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A) typosquatting
B) spamming
C) DoS attacks
D) identity theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
The best protection against many dot cons is ____.

A) your ISP
B) updated operating systems
C) antivirus programs
D) common sense
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Repeated threats or other harassment carried out online between adults is referred to as ____.

A) cyberstalking
B) computer sabotage
C) cyberterrorism
D) phishing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.

A) Trojan horse
B) worm
C) virus
D) bot
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A) Data theft
B) Information theft
C) Identity theft
D) Database theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

A) spider
B) bot
C) virus
D) spam
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

A) Sarbanes-Oxley Act
B) USA Patriot Act
C) Identity Theft and Assumption Deterrence Act of 1998
D) No Electronic Theft (NET) Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

A) private
B) public
C) organizational
D) token
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
____________________ includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

A) private key
B) e-mail address
C) public key
D) password
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.