Deck 10: Computer Security and Risks

Full screen (f)
exit full mode
Question
A virus that attaches itself to documents that contain macros is called a(n)

A)email virus.
B)macro virus.
C)Trojan horse.
D)time bomb.
Use Space or
up arrow
down arrow
to flip the card.
Question
Worms execute until

A)there is a lack of free memory or disk space.
B)it reaches a certain time or date.
C)a user pays a ransom.
D)all of the above.
Question
Collecting personal information and effectively posing as another individual is known as the crime of

A)spooling.
B)identity theft.
C)spoofing.
D)phishing.
Question
According to the FBI,how much identity theft begins with email?

A)all
B)one-half
C)one-quarter
D)two-thirds
Question
When you visit certain Web sites,spyware may be automatically downloaded.This is called a

A)botnet.
B)spybot.
C)logic bomb.
D)drive-by download.
Question
Placing a phone call pretending to be someone else,in order to trick someone into doing something is also known as

A)phishing.
B)identity theft.
C)spoofing.
D)hacking.
Question
The majority of computer crimes are committed by

A)domestic hackers.
B)company employees.
C)foreign hackers.
D)teenage computer geniuses.
Question
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?

A)Samy
B)Melissa
C)rxbot
D)Code Red
Question
An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a

A)Trojan horse.
B)virus.
C)worm.
D)botnet.
Question
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a

A)malware.
B)spyware.
C)time bomb.
D)macro virus.
Question
Which of the following is an example of social engineering?

A)malware
B)spoofing
C)botnets
D)spam
Question
Using deception to get individuals to reveal sensitive information is also known as a(n)________ attack.

A)social engineering
B)hacking
C)identity theft
D)trojan horse
Question
The typical computer criminal is a(n)

A)young hacker.
B)trusted employee with no criminal record.
C)trusted employee with a long, but secret criminal record.
D)experienced hacker.
Question
Of the following,which one is NOT a way to protect yourself from identity theft?

A)Be sure to use a secure Web site.
B)Handle email with care.
C)Make all online purchases with a debit card.
D)Do not put bills in the trash.
Question
The Code Red worm attacked

A)UNIX operating systems.
B)Microsoft Word.
C)Microsoft server software.
D)personal computers.
Question
In 1999,the Melissa virus was a widely publicized

A)email virus.
B)worm.
C)Trojan horse.
D)time bomb.
Question
Which type of virus uses computer hosts to reproduce itself?

A)time bomb
B)worm
C)Trojan horse
D)macro virus
Question
The name for harassment on the Internet is

A)cyberstalking.
B)cyberpersecution.
C)cyberdenigration.
D)cyberhounding.
Question
What is the name of an application program that gathers user information and sends it to someone through the Internet?

A)worm
B)spybot
C)logic bomb
D)botnet
Question
A program that masquerades as a useful program,but is really a destructive program,is a(n)

A)worm.
B)Trojan horse.
C)virus.
D)botnet.
Question
________ is the measurement of things such as fingerprints and retinal scans used for security access.

A)Biometrics
B)DoS
C)Computer security
D)Computer forensics
Question
Hackers who hijack legitimate Web sites and redirect users to other sites are called

A)hackers.
B)Trojan horses.
C)Webjackers.
D)denial-of-service attackers.
Question
If you want to secure an email message,use a(n)

A)decrypter.
B)encryption key.
C)encryption software package.
D)cryptosystem.
Question
Which statement is NOT true regarding antivirus programs?

A)They are designed to search for and remove viruses.
B)They will notify users when a virus is found.
C)They always detect every virus on a PC.
D)They must be updated to remain effective.
Question
Criminal hacking is also known as

A)phishing.
B)a Trojan horse.
C)cracking.
D)computer forensics.
Question
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

A)router.
B)firewall.
C)antivirus.
D)server.
Question
Software programs that close potential security breaches in an operating system or application are known as

A)security breach fixes.
B)refresh patches.
C)security repairs.
D)security patches.
Question
Unauthorized access to computer systems is called

A)a virus.
B)spoofing.
C)phishing.
D)hacking.
Question
What is the name of the storage technology that enables multiple hard disks to operate as single logical units?

A)RAID
B)DoS
C)UPS
D)PGP
Question
________ is software that can be used to encrypt data.

A)Malware
B)Decrypting software
C)PGP
D)Forensic software
Question
A virus that is programmed to destroy PC files on a specific date is known as what kind of virus?

A)botnet
B)macro virus
C)time bomb
D)spyware
Question
What is the most common tool used to restrict access to a computer system?

A)user logins
B)passwords
C)computer keys
D)access-control software
Question
When customers of a Web site are unable to access it due to a bombardment of fake traffic,it is known as

A)a virus.
B)a Trojan horse.
C)cracking.
D)a denial-of-service attack.
Question
A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse?

A)logic bomb
B)Code Red
C)Melissa
D)spybot
Question
The scrambling of code in an email message can be done using

A)cryptography.
B)programming.
C)auditing.
D)decryption.
Question
To prevent loss of data during power failures,use a(n)

A)encryption program.
B)surge protector.
C)firewall.
D)UPS.
Question
What was the name of the worm that demonstrated that a system could be infected by email even if the mail wasn't opened?

A)The Love Bug
B)Melissa
C)rxbot
D)BubbleBoy
Question
The most common passwords in the United States or Britain include all EXCEPT:

A)letmein.
B)password.
C)opensesame.
D)123456.
Question
All of these are suggestions for safe computing EXCEPT:

A)Don't borrow disks from other people.
B)Pirate software.
C)Download shareware and freeware with caution.
D)Disinfect your system.
Question
A(n)________ can shield electronic equipment from power spikes.

A)encryption program
B)surge protector
C)firewall
D)power supply
Question
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input,verification,or decision making?

A)autonomous system
B)robotic system
C)smart system
D)independent system
Question
The most common form of computer crime is theft.
Question
A challenge with high-tech weapons is that they reduce the amount of time people have to make life-and-death decisions.
Question
The most widely used data recovery technique is making regular backups.
Question
Creating strong computer security to prevent computer crime usually simultaneously helps protect privacy rights.
Question
In 2000 the U.S.government found Microsoft guilty of operating a monopoly.
Question
Theft of computers is most common for desktop computers.
Question
________ is defined as any crime completed through the use of computer technology.

A)Computer forensics
B)Computer crime
C)Phishing
D)Cracking
Question
Software that allows different levels of security per user is known as access-control software.
Question
Which law was used to silence Professor Edward Felton in 2001?

A)Digital Millennium Copyright Act of 1998
B)Telecommunications Act of 1996
C)USA Patriot Act
D)CIPA
Question
Over ________ were spent by businesses and government to repair problems in regard to Y2K.

A)1 trillion dollars
B)100 million dollars
C)1 billion dollars
D)100 billion dollars
Question
A public key is only available to the user originating a message.
Question
Security procedures eliminate all risks to computers.
Question
Information can be recovered from a hard drive even after file have been deleted.
Question
PGP uses the popular RSA public key cryptosystem.
Question
Computer crime often goes unreported because businesses fear negative publicity.
Question
Most computer systems rely solely on ________ for authentication.

A)logins
B)passwords
C)encryption
D)lock and key
Question
RAID is a collection of Internet-based disks that serve to back up a hard drive.
Question
Computer forensics is a form of computer crime.
Question
Smart cards and biometrics are two ways companies may add physical security to computer systems.
Question
A security ________ is a software program that closes possible security breaches in the operating system.
Question
The NSA has invested heavily in ________,a program to secure electronic communication from eavesdroppers while enabling the U.S.government to intercept CE signals.
Question
The Code Red worm attacked servers running operating systems from the company ________.
Question
________ are people who hijack legitimate Web pages and redirect users to other sites.
Question
________ weapons are missiles that use computerized guidance systems to locate their targets.
Question
When you use a disk in several different computers on the same day,you are taking the chance of contracting a(n)________.
Question
Match the Act on the left to the appropriate explanation on the right.

A)created as a result of the first headline-making worm
B)declared unconstitutional by the Supreme Court
C)used to arrest a student for writing to crack an Adobe product
D)defines what kinds of communications are legal online
E)created in 2001 as a response to the terrorist attacks of September 11, 2001
F)provides almost instant information on crimes and criminals
USA Patriot Act
Question
________ programs search for and eliminate viruses.
Question
An account that has additional access privileges is known as a system ________ account.
Question
________ computers,or bots,are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the computer owner.
Question
Both viruses and ________ use computer hosts to replicate.
Question
An email message claiming your Facebook account has been hacked and you need to click on a link to restore your account is an example of a(n)________ email.
Question
________-control software monitors and records computer transactions as they happen,so they can be traced and identify suspicious computer activity after the fact.
Question
An attack that creates so much bogus traffic it shuts down a network is known by the acronym ________.
Question
An encryption ________ is the secret numerical code a user will utilize to encrypt a message.
Question
In the early days of the Internet,a(n)________ was known as a person who enjoyed learning details of computer systems and writing clever programs.
Question
Networks of zombie computers are also known as ________.
Question
A(n)________ virus attaches itself to a document that contains embedded programs to automate tasks.
Question
________ refers to electronic trespassing or criminal hacking.
Question
Match the Act on the left to the appropriate explanation on the right.

A)created as a result of the first headline-making worm
B)declared unconstitutional by the Supreme Court
C)used to arrest a student for writing to crack an Adobe product
D)defines what kinds of communications are legal online
E)created in 2001 as a response to the terrorist attacks of September 11, 2001
F)provides almost instant information on crimes and criminals
Computer Fraud and Abuse Act
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Computer Security and Risks
1
A virus that attaches itself to documents that contain macros is called a(n)

A)email virus.
B)macro virus.
C)Trojan horse.
D)time bomb.
B
2
Worms execute until

A)there is a lack of free memory or disk space.
B)it reaches a certain time or date.
C)a user pays a ransom.
D)all of the above.
A
3
Collecting personal information and effectively posing as another individual is known as the crime of

A)spooling.
B)identity theft.
C)spoofing.
D)phishing.
B
4
According to the FBI,how much identity theft begins with email?

A)all
B)one-half
C)one-quarter
D)two-thirds
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
When you visit certain Web sites,spyware may be automatically downloaded.This is called a

A)botnet.
B)spybot.
C)logic bomb.
D)drive-by download.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
Placing a phone call pretending to be someone else,in order to trick someone into doing something is also known as

A)phishing.
B)identity theft.
C)spoofing.
D)hacking.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
The majority of computer crimes are committed by

A)domestic hackers.
B)company employees.
C)foreign hackers.
D)teenage computer geniuses.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?

A)Samy
B)Melissa
C)rxbot
D)Code Red
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a

A)Trojan horse.
B)virus.
C)worm.
D)botnet.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a

A)malware.
B)spyware.
C)time bomb.
D)macro virus.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an example of social engineering?

A)malware
B)spoofing
C)botnets
D)spam
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
Using deception to get individuals to reveal sensitive information is also known as a(n)________ attack.

A)social engineering
B)hacking
C)identity theft
D)trojan horse
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
The typical computer criminal is a(n)

A)young hacker.
B)trusted employee with no criminal record.
C)trusted employee with a long, but secret criminal record.
D)experienced hacker.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
Of the following,which one is NOT a way to protect yourself from identity theft?

A)Be sure to use a secure Web site.
B)Handle email with care.
C)Make all online purchases with a debit card.
D)Do not put bills in the trash.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
The Code Red worm attacked

A)UNIX operating systems.
B)Microsoft Word.
C)Microsoft server software.
D)personal computers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
In 1999,the Melissa virus was a widely publicized

A)email virus.
B)worm.
C)Trojan horse.
D)time bomb.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of virus uses computer hosts to reproduce itself?

A)time bomb
B)worm
C)Trojan horse
D)macro virus
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
The name for harassment on the Internet is

A)cyberstalking.
B)cyberpersecution.
C)cyberdenigration.
D)cyberhounding.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
What is the name of an application program that gathers user information and sends it to someone through the Internet?

A)worm
B)spybot
C)logic bomb
D)botnet
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
A program that masquerades as a useful program,but is really a destructive program,is a(n)

A)worm.
B)Trojan horse.
C)virus.
D)botnet.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
________ is the measurement of things such as fingerprints and retinal scans used for security access.

A)Biometrics
B)DoS
C)Computer security
D)Computer forensics
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
Hackers who hijack legitimate Web sites and redirect users to other sites are called

A)hackers.
B)Trojan horses.
C)Webjackers.
D)denial-of-service attackers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
If you want to secure an email message,use a(n)

A)decrypter.
B)encryption key.
C)encryption software package.
D)cryptosystem.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
Which statement is NOT true regarding antivirus programs?

A)They are designed to search for and remove viruses.
B)They will notify users when a virus is found.
C)They always detect every virus on a PC.
D)They must be updated to remain effective.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
Criminal hacking is also known as

A)phishing.
B)a Trojan horse.
C)cracking.
D)computer forensics.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

A)router.
B)firewall.
C)antivirus.
D)server.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
Software programs that close potential security breaches in an operating system or application are known as

A)security breach fixes.
B)refresh patches.
C)security repairs.
D)security patches.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
Unauthorized access to computer systems is called

A)a virus.
B)spoofing.
C)phishing.
D)hacking.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
What is the name of the storage technology that enables multiple hard disks to operate as single logical units?

A)RAID
B)DoS
C)UPS
D)PGP
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
________ is software that can be used to encrypt data.

A)Malware
B)Decrypting software
C)PGP
D)Forensic software
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
A virus that is programmed to destroy PC files on a specific date is known as what kind of virus?

A)botnet
B)macro virus
C)time bomb
D)spyware
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
What is the most common tool used to restrict access to a computer system?

A)user logins
B)passwords
C)computer keys
D)access-control software
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
When customers of a Web site are unable to access it due to a bombardment of fake traffic,it is known as

A)a virus.
B)a Trojan horse.
C)cracking.
D)a denial-of-service attack.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse?

A)logic bomb
B)Code Red
C)Melissa
D)spybot
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
The scrambling of code in an email message can be done using

A)cryptography.
B)programming.
C)auditing.
D)decryption.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
To prevent loss of data during power failures,use a(n)

A)encryption program.
B)surge protector.
C)firewall.
D)UPS.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
What was the name of the worm that demonstrated that a system could be infected by email even if the mail wasn't opened?

A)The Love Bug
B)Melissa
C)rxbot
D)BubbleBoy
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
The most common passwords in the United States or Britain include all EXCEPT:

A)letmein.
B)password.
C)opensesame.
D)123456.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
All of these are suggestions for safe computing EXCEPT:

A)Don't borrow disks from other people.
B)Pirate software.
C)Download shareware and freeware with caution.
D)Disinfect your system.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)________ can shield electronic equipment from power spikes.

A)encryption program
B)surge protector
C)firewall
D)power supply
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input,verification,or decision making?

A)autonomous system
B)robotic system
C)smart system
D)independent system
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
The most common form of computer crime is theft.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
A challenge with high-tech weapons is that they reduce the amount of time people have to make life-and-death decisions.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
The most widely used data recovery technique is making regular backups.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
Creating strong computer security to prevent computer crime usually simultaneously helps protect privacy rights.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
In 2000 the U.S.government found Microsoft guilty of operating a monopoly.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
Theft of computers is most common for desktop computers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
________ is defined as any crime completed through the use of computer technology.

A)Computer forensics
B)Computer crime
C)Phishing
D)Cracking
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
Software that allows different levels of security per user is known as access-control software.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
Which law was used to silence Professor Edward Felton in 2001?

A)Digital Millennium Copyright Act of 1998
B)Telecommunications Act of 1996
C)USA Patriot Act
D)CIPA
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
Over ________ were spent by businesses and government to repair problems in regard to Y2K.

A)1 trillion dollars
B)100 million dollars
C)1 billion dollars
D)100 billion dollars
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
A public key is only available to the user originating a message.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
Security procedures eliminate all risks to computers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
Information can be recovered from a hard drive even after file have been deleted.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
PGP uses the popular RSA public key cryptosystem.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
Computer crime often goes unreported because businesses fear negative publicity.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
Most computer systems rely solely on ________ for authentication.

A)logins
B)passwords
C)encryption
D)lock and key
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
RAID is a collection of Internet-based disks that serve to back up a hard drive.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
Computer forensics is a form of computer crime.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
Smart cards and biometrics are two ways companies may add physical security to computer systems.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
A security ________ is a software program that closes possible security breaches in the operating system.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
The NSA has invested heavily in ________,a program to secure electronic communication from eavesdroppers while enabling the U.S.government to intercept CE signals.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
The Code Red worm attacked servers running operating systems from the company ________.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
________ are people who hijack legitimate Web pages and redirect users to other sites.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
________ weapons are missiles that use computerized guidance systems to locate their targets.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
When you use a disk in several different computers on the same day,you are taking the chance of contracting a(n)________.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
Match the Act on the left to the appropriate explanation on the right.

A)created as a result of the first headline-making worm
B)declared unconstitutional by the Supreme Court
C)used to arrest a student for writing to crack an Adobe product
D)defines what kinds of communications are legal online
E)created in 2001 as a response to the terrorist attacks of September 11, 2001
F)provides almost instant information on crimes and criminals
USA Patriot Act
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
________ programs search for and eliminate viruses.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
An account that has additional access privileges is known as a system ________ account.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
________ computers,or bots,are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the computer owner.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
Both viruses and ________ use computer hosts to replicate.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
An email message claiming your Facebook account has been hacked and you need to click on a link to restore your account is an example of a(n)________ email.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
________-control software monitors and records computer transactions as they happen,so they can be traced and identify suspicious computer activity after the fact.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
An attack that creates so much bogus traffic it shuts down a network is known by the acronym ________.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
An encryption ________ is the secret numerical code a user will utilize to encrypt a message.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
In the early days of the Internet,a(n)________ was known as a person who enjoyed learning details of computer systems and writing clever programs.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
Networks of zombie computers are also known as ________.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
A(n)________ virus attaches itself to a document that contains embedded programs to automate tasks.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
________ refers to electronic trespassing or criminal hacking.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
Match the Act on the left to the appropriate explanation on the right.

A)created as a result of the first headline-making worm
B)declared unconstitutional by the Supreme Court
C)used to arrest a student for writing to crack an Adobe product
D)defines what kinds of communications are legal online
E)created in 2001 as a response to the terrorist attacks of September 11, 2001
F)provides almost instant information on crimes and criminals
Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 84 flashcards in this deck.