Deck 9: Network and Internet Security

Full screen (f)
exit full mode
Question
Information used in identity theft can be obtained by skimming or via social engineering.
Use Space or
up arrow
down arrow
to flip the card.
Question
Internet offer scams include a wide range of scams offered through Web sites or unsolicited e-mails.
Question
Like a computer virus,a computer worm infects other computer files to replicate itself.
Question
A fingerprint recognition system is typically used to protect access to office computers,to automatically supply Web site passwords on home computers,and to pay for products or services.
Question
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Question
It is important to select strong passwords and change them frequently.
Question
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
Question
While two-factor authentication systems are common in the United States,they are not widely used in other countries.
Question
Many Internet security concerns today can be categorized as cybercrimes.
Question
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
Question
Wi-Fi security features work by default.
Question
Private key encryption is also called symmetric key encryption.
Question
When you send someone an encrypted message using public key encryption,only a public key is necessary to decrypt it.
Question
The Fair and Accurate Credit Transactions Act (FACTA)enables all Americans to get a free copy of their credit report,upon request,each year from the three major consumer credit bureaus.
Question
Fortunately,identity theft is declining and does not pose a real danger to individuals today.
Question
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal,but it is considered highly unethical and irresponsible behavior.
Question
Denial of service attacks are usually of insignificant cost in terms of business lost.
Question
Biometric authentication uses information that an individual should know or can easily remember.
Question
Unauthorized use involves using a computer resource for unauthorized activities.
Question
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
Question
Computer crime is sometimes referred to as ____.

A)hacking
B)cybercrime
C)cyberstalking
D)spoofing
Question
____ are sets of tools that allow hackers to access a system.

A)Toolkits
B)Hackkits
C)Crimekits
D)Rootkits
Question
Computer spyware includes any illegal act involving a computer.
Question
Advocates of ____ state that,unless individuals or businesses protect their access points,they are welcoming others to use them.

A)spoofing
B)phishing
C)spamming
D)war driving
Question
A(n)denial of service (DoS)attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.
Question
USB security keys are also called USB security tokens.
Question
In spoofing,terrorists launch attacks via the Internet.
Question
Numeric passwords are also referred to passcodes.
Question
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
Question
Online auction spam occurs when an item purchased through an online auction is never delivered after payment,or the item is not as specified by the seller.
Question
AntiDoS software is used to detect and eliminate computer viruses and other types of malware.
Question
____ occurs whenever an individual gains access to a computer,network,file,or other resource without permission.

A)Spoofing
B)Unauthorized access
C)Phishing
D)Vandalizing
Question
____ refers to the act of breaking into a computer or network.

A)Spamming
B)Phishing
C)Hacking
D)Spoofing
Question
A type of computer infection occurs when a hacker breaches a computer system in order to delete data,change data,modify programs,or otherwise alter the data and programs located there.
Question
A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer.
Question
Cuts or other changes to a finger may prevent access via a(n)keystroke reader.
Question
Phishing schemes use legitimate-looking e-mails to trick users into providing private information.
Question
Identification systems determine whether or not the person attempting access is actually who he or she claims to be.
Question
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
Question
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail,proprietary encrypted e-mail can be used.
Question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A)Touch object
B)Possessed object
C)Two-factor
D)Biometric
Question
Like a computer virus,a ____ is a malicious program designed to cause damage.

A)computer worm
B)scam
C)phish
D)computer bug
Question
____ uses a single secret key to both encrypt and decrypt the file or message.

A)Private key encryption
B)Asymmetric key encryption
C)Public key encryption
D)Synchronous key encryption
Question
Increasingly,USB security keys,also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network,to supply Web site usernames and passwords,or to provide other security features-are being used.

A)botherders
B)botnets
C)passes
D)tokens
Question
____,the most commonly used type of possessed knowledge,are secret words or character combinations associated with an individual.

A)Usernames
B)PINs
C)Passwords
D)Codes
Question
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A)CryptMail
B)QuietMail
C)HushMail
D)PrivateMail
Question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user,that is designed to alter the way a computer operates,and that can replicate itself to infect any new media it has access to.

A)phish
B)virus
C)bot
D)link
Question
____ is a generic term that refers to any type of malicious software.

A)Spamware
B)Malware
C)Spyware
D)Badware
Question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A)virus definitions
B)upgrades
C)software versions
D)virus reports
Question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A)Trojan horse
B)firewall
C)hub
D)bridge
Question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A)virus
B)software
C)worm
D)hacker
Question
One emerging type of Trojan horse is called a ____-Access Trojan.

A)Demote
B)Remote
C)Control
D)Hacker
Question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A)spider
B)server
C)client
D)bot
Question
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A)Trojan horse
B)computer worm
C)computer insect
D)computer bug
Question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A)laptop private network
B)USB private network
C)tunnel private network
D)virtual private network
Question
____ identify users by a particular unique biological characteristic.

A)Possessed object access systems
B)Password access systems
C)Possessed knowledge access systems
D)Biometric access systems
Question
A booming area of computer crime involves online fraud,theft,scams,and related activities collectively referred to as ____.

A)e-cons
B)e-scams
C)dot frauds
D)dot cons
Question
____ are acts of malicious destruction to a computer or computer resource.

A)Phishing attacks
B)Blocking attacks
C)Computer sabotage
D)Spoofing attacks
Question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home,outside a Wi-Fi hotspot location,or near a local business).

A)war driving
B)Wi-Fi piggybacking
C)Wi-Fi worming
D)denial of service
Question
<strong>  ____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer.</strong> A)Data-leakage prevention B)Device authentication C)Professional firewall D)Network quarantine <div style=padding-top: 35px>
____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer.

A)Data-leakage prevention
B)Device authentication
C)Professional firewall
D)Network quarantine
Question
____ can be extremely distressing for victims,can take years to straighten out,and can be very expensive.

A)Spams
B)Identity theft
C)Remote access
D)Software theft
Question
A(n)____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Question
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A)EV B)SK C)SQL D)HTTPS <div style=padding-top: 35px>
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A)EV
B)SK
C)SQL
D)HTTPS
Question
____________________ includes any illegal act involving a computer.
Question
Phishing schemes may use a technique called ____,which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A)typosquatting
B)spamming
C)DoS attacks
D)identity theft
Question
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____,which appears as asterisks on the screen as it is being entered.

A)private key
B)e-mail address
C)public key
D)password
Question
The ____,implemented in 2001,grants federal authorities expanded surveillance and intelligence-gathering powers,such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

A)Sarbanes-Oxley Act
B)USA Patriot Act
C)Identity Theft and Assumption Deterrence Act of 1998
D)No Electronic Theft (NET)Act
Question
The ____ includes provisions to combat cyberterrorism,including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A)Heath Insurance Portability and Accountability Act (HIPAA)
B)PROTECT Act
C)Homeland Security Act of 2002
D)National Information Infrastructure Protection Act
Question
In businesses,access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Question
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
One of the first items that Melissa installed was a(n)____,which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

A)botnet
B)firewall
C)IPS
D)encryption algorithm
Question
Repeated threats or other harassment carried out online between adults is referred to as ____.

A)cyberstalking
B)computer sabotage
C)cyberterrorism
D)phishing
Question
Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
Question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A)Data theft
B)Information theft
C)Identity theft
D)Database theft
Question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A)Framing
B)Fishing
C)Pharming
D)Farming
Question
Case 9-2
Fernando has been having problems with his computer.He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician tells Fernando that his computer has a ____,which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

A)spider
B)bot
C)virus
D)spam
Question
The best protection against many dot cons is ____.

A)your ISP
B)updated operating systems
C)antivirus programs
D)common sense
Question
Case 9-2
Fernando has been having problems with his computer.He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician also found a ____ on the computer,which is designed to find sensitive information about the user located on the PC and then send it to the malware creator.The technician explains that this type of malware cannot replicate itself.

A)Trojan horse
B)worm
C)virus
D)bot
Question
____________________ access refers to individuals gaining access to a computer,network,file,or other resource without permission.
Question
When a digitally signed document is received,the recipient's computer uses the sender's ____ key to verify the digital signature.

A)private
B)public
C)organizational
D)token
Question
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
Melissa also decided to use a(n)____,which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

A)IPS
B)firewall
C)antivirus software
D)RAM
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Network and Internet Security
1
Information used in identity theft can be obtained by skimming or via social engineering.
True
2
Internet offer scams include a wide range of scams offered through Web sites or unsolicited e-mails.
True
3
Like a computer virus,a computer worm infects other computer files to replicate itself.
False
4
A fingerprint recognition system is typically used to protect access to office computers,to automatically supply Web site passwords on home computers,and to pay for products or services.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
It is important to select strong passwords and change them frequently.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
While two-factor authentication systems are common in the United States,they are not widely used in other countries.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Many Internet security concerns today can be categorized as cybercrimes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Wi-Fi security features work by default.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Private key encryption is also called symmetric key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
When you send someone an encrypted message using public key encryption,only a public key is necessary to decrypt it.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
The Fair and Accurate Credit Transactions Act (FACTA)enables all Americans to get a free copy of their credit report,upon request,each year from the three major consumer credit bureaus.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Fortunately,identity theft is declining and does not pose a real danger to individuals today.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal,but it is considered highly unethical and irresponsible behavior.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Denial of service attacks are usually of insignificant cost in terms of business lost.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Biometric authentication uses information that an individual should know or can easily remember.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Unauthorized use involves using a computer resource for unauthorized activities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Computer crime is sometimes referred to as ____.

A)hacking
B)cybercrime
C)cyberstalking
D)spoofing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
____ are sets of tools that allow hackers to access a system.

A)Toolkits
B)Hackkits
C)Crimekits
D)Rootkits
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Computer spyware includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Advocates of ____ state that,unless individuals or businesses protect their access points,they are welcoming others to use them.

A)spoofing
B)phishing
C)spamming
D)war driving
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)denial of service (DoS)attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
USB security keys are also called USB security tokens.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
In spoofing,terrorists launch attacks via the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Numeric passwords are also referred to passcodes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Online auction spam occurs when an item purchased through an online auction is never delivered after payment,or the item is not as specified by the seller.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
AntiDoS software is used to detect and eliminate computer viruses and other types of malware.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
____ occurs whenever an individual gains access to a computer,network,file,or other resource without permission.

A)Spoofing
B)Unauthorized access
C)Phishing
D)Vandalizing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
____ refers to the act of breaking into a computer or network.

A)Spamming
B)Phishing
C)Hacking
D)Spoofing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
A type of computer infection occurs when a hacker breaches a computer system in order to delete data,change data,modify programs,or otherwise alter the data and programs located there.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Cuts or other changes to a finger may prevent access via a(n)keystroke reader.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Phishing schemes use legitimate-looking e-mails to trick users into providing private information.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Identification systems determine whether or not the person attempting access is actually who he or she claims to be.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail,proprietary encrypted e-mail can be used.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A)Touch object
B)Possessed object
C)Two-factor
D)Biometric
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Like a computer virus,a ____ is a malicious program designed to cause damage.

A)computer worm
B)scam
C)phish
D)computer bug
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
____ uses a single secret key to both encrypt and decrypt the file or message.

A)Private key encryption
B)Asymmetric key encryption
C)Public key encryption
D)Synchronous key encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
Increasingly,USB security keys,also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network,to supply Web site usernames and passwords,or to provide other security features-are being used.

A)botherders
B)botnets
C)passes
D)tokens
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
____,the most commonly used type of possessed knowledge,are secret words or character combinations associated with an individual.

A)Usernames
B)PINs
C)Passwords
D)Codes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

A)CryptMail
B)QuietMail
C)HushMail
D)PrivateMail
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
A computer ____ is a software program that is installed without the permission or knowledge of the computer user,that is designed to alter the way a computer operates,and that can replicate itself to infect any new media it has access to.

A)phish
B)virus
C)bot
D)link
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
____ is a generic term that refers to any type of malicious software.

A)Spamware
B)Malware
C)Spyware
D)Badware
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A)virus definitions
B)upgrades
C)software versions
D)virus reports
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A)Trojan horse
B)firewall
C)hub
D)bridge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A)virus
B)software
C)worm
D)hacker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
One emerging type of Trojan horse is called a ____-Access Trojan.

A)Demote
B)Remote
C)Control
D)Hacker
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A)spider
B)server
C)client
D)bot
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
A ____ is a malicious program that masquerades as something else-usually as some type of application program.

A)Trojan horse
B)computer worm
C)computer insect
D)computer bug
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

A)laptop private network
B)USB private network
C)tunnel private network
D)virtual private network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
____ identify users by a particular unique biological characteristic.

A)Possessed object access systems
B)Password access systems
C)Possessed knowledge access systems
D)Biometric access systems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A booming area of computer crime involves online fraud,theft,scams,and related activities collectively referred to as ____.

A)e-cons
B)e-scams
C)dot frauds
D)dot cons
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
____ are acts of malicious destruction to a computer or computer resource.

A)Phishing attacks
B)Blocking attacks
C)Computer sabotage
D)Spoofing attacks
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home,outside a Wi-Fi hotspot location,or near a local business).

A)war driving
B)Wi-Fi piggybacking
C)Wi-Fi worming
D)denial of service
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
<strong>  ____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer.</strong> A)Data-leakage prevention B)Device authentication C)Professional firewall D)Network quarantine
____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer.

A)Data-leakage prevention
B)Device authentication
C)Professional firewall
D)Network quarantine
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
____ can be extremely distressing for victims,can take years to straighten out,and can be very expensive.

A)Spams
B)Identity theft
C)Remote access
D)Software theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
A(n)____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
<strong>  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.</strong> A)EV B)SK C)SQL D)HTTPS
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

A)EV
B)SK
C)SQL
D)HTTPS
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Phishing schemes may use a technique called ____,which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A)typosquatting
B)spamming
C)DoS attacks
D)identity theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____,which appears as asterisks on the screen as it is being entered.

A)private key
B)e-mail address
C)public key
D)password
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
The ____,implemented in 2001,grants federal authorities expanded surveillance and intelligence-gathering powers,such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

A)Sarbanes-Oxley Act
B)USA Patriot Act
C)Identity Theft and Assumption Deterrence Act of 1998
D)No Electronic Theft (NET)Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The ____ includes provisions to combat cyberterrorism,including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A)Heath Insurance Portability and Accountability Act (HIPAA)
B)PROTECT Act
C)Homeland Security Act of 2002
D)National Information Infrastructure Protection Act
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
In businesses,access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
One of the first items that Melissa installed was a(n)____,which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

A)botnet
B)firewall
C)IPS
D)encryption algorithm
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Repeated threats or other harassment carried out online between adults is referred to as ____.

A)cyberstalking
B)computer sabotage
C)cyberterrorism
D)phishing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

A)Data theft
B)Information theft
C)Identity theft
D)Database theft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A)Framing
B)Fishing
C)Pharming
D)Farming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Case 9-2
Fernando has been having problems with his computer.He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician tells Fernando that his computer has a ____,which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

A)spider
B)bot
C)virus
D)spam
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
The best protection against many dot cons is ____.

A)your ISP
B)updated operating systems
C)antivirus programs
D)common sense
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Case 9-2
Fernando has been having problems with his computer.He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician also found a ____ on the computer,which is designed to find sensitive information about the user located on the PC and then send it to the malware creator.The technician explains that this type of malware cannot replicate itself.

A)Trojan horse
B)worm
C)virus
D)bot
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ access refers to individuals gaining access to a computer,network,file,or other resource without permission.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
When a digitally signed document is received,the recipient's computer uses the sender's ____ key to verify the digital signature.

A)private
B)public
C)organizational
D)token
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Case 9-1
Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network.
Melissa also decided to use a(n)____,which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

A)IPS
B)firewall
C)antivirus software
D)RAM
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.