Chapter 5 Repeated Attacks Could Tarnish Cengage Learning Testing Powered

subject Type Homework Help
subject Pages 9
subject Words 3226
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
154. A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service
such as the web or email.
155. A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.
156. A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and
email vulnerabilities.
157. To prevent unauthorized access and use, at a minimum a company should have a written ____________________
that outlines the activities for which a computer or network may and may not be used.
158. A(n) ____________________ control is a security measure that defines who can access a computer, when they can
access it, and what actions they can take while accessing the computer.
159. A(n) ____________________ object is any item that must be carried to gain access to a computer or computer
facility.
page-pf2
160. A(n) ____________________ device authenticates a person’s identity by translating a personal characteristic into a
digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral
characteristic.
161. ____________________ involves the examination of media, programs, data and log files on computers, mobile
devices, servers, and networks.
162. A(n) ____________________ agreement is the right to use software.
163. The most common type of license included with software purchased by individual users is a(n)
____________________.
165. ____________________ occurs when someone steals personal or confidential information.
page-pf3
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
166. ____________________ is the process of converting readable data into unreadable characters to prevent
unauthorized access.
167. A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an
electronic message to verify the identity of the message sender.
168. A(n) ____________________ is a written plan that describes the steps an organization would take to restore its
computer operations in the event of a disaster.
page-pf4
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
169. A(n) ____________________ is a wireless network name, which you should change from the default to something
that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to
other wireless networks.
170. Employers and schools often specify standards for the ethical use of technology in an IT ____________________
and then distribute these standards to employees and students.
171. Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.
page-pf5
172. Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of
how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices
become infected with viruses, and list common types of malware
page-pf6
173. Describe botnets and denial of service attacks.
page-pf7
174. Discuss the measures you can take to safeguard home computers and devices.
175. Discuss the four types of software theft.
page-pf8
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
176. Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.
page-pf9
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
Critical Thinking Questions
Case 5-1
One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because
this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is
your responsibility to explain this practice to students through the use of some examples.
177. Which of the following is NOT permissible under a single-user license agreement?
a. Jamie installs Quark Xpress on a single computer.
b. Christine leases her copy of Dreamweaver.
c. Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
d. Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.
178. Which of the following practice IS permissible under a single-user license agreement?
a. Ahmed rents his copy of Adobe Illustrator.
b. The lab administrator at the college installs Fireworks on the school computer lab network.
c. Karen installs Flash on one desktop computer and one notebook computer.
d. Perry gives a copy of Microsoft Word 2013 to his friend, while continuing to use the
software.
page-pfa
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
Critical Thinking Questions
Case 5-2
In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a
lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.
179. Which of the following is NOT a question of computer ethics?
a. Users are required to provide a software product’s 25-character identification number before
installing software.
b. A student copies text from the web and uses it in a research paper for his English class.
c. A student who has been expelled from school installs a computer virus on a computer in the
student lab.
d. Someone copies The DaVinci Code to the web and encourages others to read it.
180. Which of the following is not a frequently discussed area of computer ethics?
a. green computing
b. information accuracy
c. information authorship
d. codes of conduct
Identify the letter of the choice that best matches the phrase or definition.
a.
digital signature
b.
digital certificate
c.
CA
d.
digital security risk
e.
firewall
f.
botnet
g.
zombie
h.
clickjacking
i.
Digital Millennium Copyright Act (DCMA)
page-pfb
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
j.
DoS attack
k.
AUP
l.
iris recognition system
m.
web filtering software
n.
password
o.
script kiddie
p.
ciphertext
q.
plaintext
r.
bot
s.
piracy
t.
copyright
REFERENCES:
204
206
234
211
218
202
216
208
225
215
231
214
233
210
LEARNING OBJECTIVES:
VERR.DICO.15.1 - 1
VERR.DICO.15.11 - 10
VERR.DICO.15.2 - 2
VERR.DICO.15.3 - 3
VERR.DICO.15.4 - 4
VERR.DICO.15.5 - 5
VERR.DICO.15.9 - 9
181. Usually does not have advanced computer and technical skills.
182. A group of compromised computers.
183. A program that restricts access to specified websites.
184. Most systems require that a user selects this on his or her own.
page-pfc
185. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
186. An authorized person or company that issues and verifies digital certificates.
187. Any event or action that could cause a loss of or damage to computer or mobile device hardware.
188. In the encryption process, the unencrypted, readable data.
189. In the encryption process, the encrypted (scrambled) data.
190. Protects a network's resources from intrusion.
191. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of
the message sender.
192. Protects any tangible form of expression.
194. A notice that guarantees a user or a website is legitimate.
195. A program that performs a repetitive task on a network.
page-pfd
Name:
Class:
Date:
DC Chapter 05: Inside Computers and Mobile Devices
196. A scam in which a button or link on a website contains a malicious program.
197. Biometric device used in high security areas.
198. Makes it illegal to circumvent antipiracy schemes in commercial software.
199. Outlines the activities for which a computer or network may and may not be used.
200. An assault whose purpose is to disrupt computer access to an Internet service

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.