Chapter 5 How much do fingerprint readers typically cost?

subject Type Homework Help
subject Pages 14
subject Words 3908
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
1. Which of the following is any event or action that could cause a loss of or damage to computer hardware, software,
data, information, or processing capability?
a.
digital security risk
b.
information liability
c.
technical terrorism
d.
network compromise
2. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
a.
hacker
b.
script kiddie
c.
cyberextortionist
d.
cyberterrorist
3. Which of the following is someone who demands payment in order to stop an attack on an organization’s technology
infrastructure?
a.
hacker
b.
script kiddie
c.
cyberextortionist
d.
cyberterrorist
4. Which of the following is someone who uses the Internet or network to destroy or damage computers for political
reasons?
a.
hacker
b.
script kiddie
c.
cyberextortionist
d.
cyberterrorist
5. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
a.
malware
b.
untrusted sources
c.
threats
d.
cybermalls
6. What is the term for a program that performs a repetitive task on a network?
page-pf2
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
a.
zombie
b.
rootkit
c.
bot
d.
Trojan horse
7. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple
computer networks?
a.
distributed
b.
delayed
c.
limited
d.
staggered
8. Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to
a victim computer or network?
a.
rebuking
b.
spoofing
c.
transmitting
d.
victimizing
9. Which of the following is a federally funded Internet security research and development center?
a.
W3C
b.
NSF
c.
CERT/CC
d.
Internet2
10. Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
a.
keygens
b.
indices
c.
backdoors
d.
macros
11. Which of the following is not a security product developer?
a.
Adobe
b.
AVG
c.
McAfee
d.
Symantec
page-pf3
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
12. Many websites, like that in the accompanying figure, require a user to enter a private combination of characters
associated with a user name that allows access to certain computer resources. What is the term for this combination of
characters?
a.
PIN
b.
password
c.
secure key
d.
passterm
13. Which of the following is not a possessed object?
a.
PIN
b.
badge
c.
smart card
d.
key
page-pf4
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
14. How much do fingerprint readers typically cost?
a.
less than $10
b.
less than $100
c.
between $250 and $500
d.
more than $1000
15. Into which of the following kinds of ports do external fingerprint readers plug?
a.
parallel
b.
MIDI
c.
USB
d.
serial
16. Which of the following can transmit germs?
a.
iris recognition systems
b.
digital forensics systems
c.
face recognition systems
d.
hand geometry systems
17. Which kind of license is a legal agreement that allows multiple users to access the software on the server
simultaneously?
a.
site
b.
network
c.
distributed
d.
multipurpose
18. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a
volume discount?
a.
network
b.
distributed
c.
site
d.
multipurpose
19. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
page-pf5
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
a.
re-securing
b.
decryption
c.
assessment
d.
digitization
20. Which encryption algorithm inserts characters between existing characters?
a.
substitution
b.
transposition
c.
expansion
d.
compaction
21. Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain
number of positions?
a.
expansion algorithm
b.
Caesar cipher
c.
transposition algorithm
d.
compaction algorithm
22. What is another name for public key encryption?
a.
controlled key encryption
b.
virtual key encryption
c.
asymmetric key encryption
d.
secure key encryption
23. Which of the following provides the mobile user with a secure connection to the company network server?
a.
XPN
b.
SPN
c.
TPN
d.
VPN
24. What is the term for a website that uses encryption techniques to protect its data?
a.
virtual site
b.
locked site
c.
secure site
d.
vault
page-pf6
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
25. How long can digital certificates be valid?
a.
six months
b.
two years
c.
four years
d.
five years
26. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
a.
assigned
b.
secure
c.
protected
d.
digital
27. Which of the following is an authorized person or company that issues and verifies digital certificates?
a.
certificate authority
b.
certificate agency
c.
certificate office
d.
certificate bureau
28. Which of the following terms refers to making a copy of a file?
a.
restoring
b.
backing up
c.
encrypting
d.
deciphering
29. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they
bring the files to their original location on a computer?
a.
They reset the files.
b.
The index the files.
c.
They restore the files.
d.
They resource the files.
page-pf7
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
30. Which of the following terms means in a location separate from the computer site?
a.
off-scope
b.
off-shore
c.
off-line
d.
off-site
31. Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or
destroyed?
a.
restored file
b.
bot
c.
IP file
d.
backup
32. With a three-generation backup policy, the grandparent is which of the following?
a.
most recent copy of the file
b.
second oldest copy of the file
c.
oldest copy of the file
d.
original file
33. Which of the following copies all of the files in a computer?
a.
full backup
b.
incremental backup
c.
differential backup
d.
selective backup
34. With which of the following do users choose which folders and files to include in a backup?
a.
full backup
b.
incremental backup
c.
differential backup
d.
selective backup
page-pf8
35. One study found that a certain percentage of wireless connections like the kind in the accompanying figure are
unsecured, leaving them susceptible to hackers. What was that percentage?
a.
25
b.
35
c.
55
d.
75
36. Which law states that it is not illegal to intercept or access an electronic communication made through an electronic
communication system that is configured so that such electronic communication is readily accessible to the general
public?
a.
CAN-SPAM Act
b.
Computer Abuse Amendments Act
c.
COPPA
d.
Electronic Communication Privacy Act
37. Which of the following categories are the rights to which creators are entitled for their work?
page-pf9
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
a.
community property
b.
intellectual property
c.
creative
d.
ethical
38. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes,
company and product names, and logos?
a.
PGP
b.
DoS
c.
IP
d.
TCP
39. Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
a.
intellectual property deed
b.
content license
c.
access right
d.
copyright
40. An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the
following?
a.
practical
b.
permissible
c.
acceptable
d.
ethical
41. Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
a.
ENERGY STAR
b.
SECURE ELECTRONICS
c.
ACCEPTABLE USE
d.
GREEN COMPUTING
42. Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of
information about them?
a.
data rights
b.
acceptable use
page-pfa
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
c.
social restrictions
d.
information privacy
43. Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s
computer?
a.
worm
b.
spike
c.
cookie
d.
payload
44. Websites use which of the following to keep track of items in a user’s shopping cart?
a.
session cookie
b.
zombie
c.
adware
d.
shopping bot
45. Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s
personal and financial information?
a.
spam
b.
spit
c.
phishing
d.
spyware
page-pfb
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
46. Internet advertising firms often use which of the following to collect information about users web browsing habits?
a.
comware
b.
postware
c.
spyware
d.
billware
47. Which of the following laws provides the same protection that covers mail and telephone communications to
electronic communications such as voice mail?
a.
Electronic Communications Privacy Act (ECPA)
b.
Fair Credit Reporting Act
c.
Computer Fraud and Abuse Act
d.
Computer Matching and Privacy Protection Act
48. Many businesses use which of the following to limit employees’ web access?
a.
content filtering
b.
web bugs
c.
honeypots
d.
spyware
49. Which of the following is the process of restricting access to certain material on the web?
a.
text remastering
b.
content filtering
c.
indexing
d.
material masking
50. Which of the following involves the use of computers to observe, record, and review an employee’s use of a
computer, including communications such as email messages, keyboarding activity, and websites visited?
a.
manager filtering
b.
employee monitoring
c.
job spamming
d.
employee indexing
page-pfc
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
COGNITIVE ASSESSMENT
51. Which of the following best describes the term, cybercrime?
a.
online or Internet-based illegal acts
b.
any illegal act involving a computer
c.
a type of gaming software that simulates criminal acts
d.
using the Internet to apprehend and prosecute criminals
52. Which term is used to describe software used by cybercriminals?
a.
cyberware
b.
conware
c.
criminalware
d.
crimeware
53. Which of the following terms refers to someone who accesses a computer or network illegally with the intent of
malicious action?
a.
script kiddie
b.
cracker
c.
cyberextortionist
d.
cyberterrorist
54. Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for
political reasons?
a.
script kiddie
b.
cracker
c.
cyberextortionist
d.
cyberterrorist
55. Which of the following statements is not true about Internet and network attacks?
a.
No central administrator is present on the Internet.
b.
It is usually the responsibility of the network administrators to take measures to protect a network from
page-pfd
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
security risks.
c.
Information kept on an organization’s premises has a higher security risk than information transmitted over
networks.
d.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back
doors, and spoofing.
56. Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and
possibly shutting down the computer or network?
a.
a virus
b.
a worm
c.
a Trojan horse
d.
a rootkit
57. Which of the following terms is used to describe a program that hides in a computer and allows someone from a
remote location to take full control of the computer?
a.
a virus
b.
a worm
c.
a Trojan horse
d.
a rootkit
58. What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s
operations?
a.
malware
b.
cybersoft
c.
evilapp
d.
viralware
59. The term, payload, as it pertains to computer crime, is defined as _____________.
a.
the money a criminal receives from extortion or other computer crimes
b.
the amount of data loss to a company or individual who is a victim of a computer crime
c.
the destructive event or prank the program is intended to deliver
d.
the financial burden computer crime places on its victims
page-pfe
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
60. The term, botnet, means _____________.
a.
a program that performs a repetitive task on a network
b.
spam sent via email to spread viruses or commit a distributed denial of service attack
c.
a group of compromised computers connected to a network that attacks other networks
d.
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
61. A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
a.
sending spam via email
b.
spreading viruses
c.
committing a distributed denial of service attack
d.
authoring ActiveX scripts
62. The term, zombie, is _____________.
a.
a program that performs a repetitive task on a network
b.
spam sent via email to spread viruses or commit a distributed denial of service attack
c.
a group of compromised computers connected to a network that attacks other networks
d.
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an
outsider
63. Which of the following is the least likely motive for a DDoS?
a.
political anger
b.
spoofing
c.
extortion
d.
negative recognition
64. What happens during a DDoS attack?
page-pff
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
a.
An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
b.
Antivirus software disables a virus and protects the computer or network from unauthorized access.
c.
The police use a virus and other measures to take down a network of computer criminals.
d.
A zombie army is used to attack computers or computer networks.
65. The term back door, as it refers to computer crime, is _____________.
a.
the area of memory where information about a virus or attempted attack is sent by the antivirus software in
order to prevent similar attacks in the future
b.
a program or set of instructions that allows users to bypass security controls when accessing a program,
computer, or network
c.
the vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
d.
a weakness in a computer or network’s security system that enables criminals to gain unauthorized access
66. Which of the following refers to a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network?
a.
spoofing
b.
phishing
c.
veiling
d.
costuming
67. The term firewall is _____________.
a.
the access point a hacker uses to intrude on a computer or network
b.
a program that searches for cybercriminals by looking for patterns in attacks
c.
hardware and/or software that protects a network’s resources from intrusion
d.
a virus that prevents the computer or network from accessing outside resources
68. What is an AUP intended to do?
a.
license software for individual use
b.
outline computer activities for which the computer and network may or may not be used
page-pf10
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
c.
contract with an outside organization to provide security and recovery services for a network
d.
establish a network of computers, such as a homegroup
69. You have encountered a technology that is effective in blocking computer-generated attempts to access a website
because it is generally easy for humans to recognize distorted characters. What is this technology?
a.
CAPTCHA
b.
CERT/CC
c.
two-step verification
d.
serial authentication
70. Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful
access attempts?
a.
an access control
b.
an attempt log
c.
an attack index
d.
an audit trail
71. The term CAPTCHA is _____________.
a.
a private combination of words associated with a user name that allows access to computer resources
b.
the average time it takes a computer to discover a password based on the number of characters
c.
a digital image used to help decipher a faded or blurry word in digitized news archives
d.
a series of distorted characters that a user is required to enter correctly to continue using a website
72. The term, PIN, is an acronym for which of the following?
a.
personal identification number
b.
private Internet notification
c.
possessed information number
d.
personal information network
73. Which of the following does your new smartphone use to unlock the device?
page-pf11
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
a.
hand geometry system
b.
face recognition system
c.
iris recognition system
d.
digital forensics system
74. Which of the following does your company use to track your time and attendance?
a.
face recognition system
b.
iris recognition system
c.
hand geometry system
d.
digital forensics system
75. Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
a.
face recognition system
b.
iris recognition system
c.
hand geometry system
d.
digital forensics system
76. Which of the following does your college use to verify your identity?
a.
face recognition system
b.
iris recognition system
c.
hand geometry system
d.
digital forensics system
77. Which of the following does your financial service institution use to secure the transactions you make using their
phone banking service?
a.
digital forensics system
b.
voice verification system
c.
iris recognition system
d.
hand geometry system
78. Which of the following does your financial institution use to reduce fraud?
a.
digital forensics system
b.
iris recognition system
c.
signature verification system
d.
hand geometry system
page-pf12
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
79. Which of the following does a new federal laboratory use in its high security areas?
a.
signature verification system
b.
digital forensics system
c.
hand geometry system
d.
iris recognition system
80. Which of the following statements is not true about biometric devices?
a.
Personal characteristics are unique and cannot be forgotten or misplaced.
b.
Biometric devices are an unreliable method of identification and notification.
c.
Examples include fingerprint readers and hand geometry systems.
d.
Biometric devices translate a personal characteristic into a digital code.
81. What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
a.
cybersleuthing
b.
digital forensics
c.
system analysis
d.
data mining
82. Which of the following can be used to create a software registration number, sometimes illegally?
a.
BSA
b.
decryption key
c.
keygen
d.
public key
83. You have just provided the identification number that associates your new software purchase with the mobile device
on which you installed the software. What is the term for this process?
a.
software deployment
b.
software decryption
c.
app installation
d.
product activation
page-pf13
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
84. When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
a.
information theft
b.
software theft
c.
digital forensics
d.
decryption
85. In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
a.
substitution
b.
transposition
c.
expansion
d.
compaction
86. In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
a.
substitution
b.
transposition
c.
expansion
d.
compaction
87. In your encryption algorithm, you removed every third letter. Which algorithm did you use?
a.
substitution
b.
transposition
c.
expansion
d.
compaction
88. What is an EULA intended to do?
a.
license software for individual use
b.
outline computer activities for which the computer and network may or may not be used
c.
contract with an outside organization to provide security and recovery services for a network
d.
establish a network of computers, such as a homegroup
page-pf14
89. Which of the following statements is not true about software theft?
a.
A keygen distributes user names and passwords to those who register their legally purchased copies of a
software program.
b.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
c.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
d.
Software theft includes disabling or removing programs from company computers.
90. Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable
ciphertext?
a.
a decipher module
b.
a translation tool
c.
an encryption algorithm
d.
a decryption key
91. Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to
verify the identity of the message sender?
a.
a certificate authority
b.
a digital signature
c.
an encryption key
d.
a hash
92. Which of the following statements is not a safeguard against the failure of hardware?
a.
surge protectors
b.
fault-tolerant computers
c.
device-tracking apps
d.
UPS
93. Which of the following statements is not true about backing up?
a.
Backup programs are available from many sources.
b.
Continuous data protection typically is used only by large enterprises.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.