Physics Unit F Biometrics is a security measure that restricts access

subject Type Homework Help
subject Pages 9
subject Words 2343
subject Authors Dan Oja, June Jamrich Parsons

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Unit F: Data Security
TRUE/FALSE
1. Developing steps to recover from a disaster is one step of risk management.
2. MTBF measures the security risks of a computer system.
3. A power spike is another term for power surge.
4. A surge strip offers an uninterruptible power supply.
5. Power strips offer similar protection to surge strips.
6. Biometrics is a security measure that restricts access based on physical trait, such as finger prints.
7. Firewalls are software that prevent unauthorized access to a system.
8. A keylogger is a program that records your keystrokes in order to steal your passwords.
9. A worm attacks all of the files on your computer one by one.
10. Some viruses are programmed to release on a certain date or in response to an event.
11. All viruses have .exe file extensions.
12. Web sites that contain games are common sources of viruses.
page-pf2
13. Using HTML format for your e-mails increases your risks of receiving a virus.
14. An estimated 66% of spam circulating on the Internet is sent through botnets.
15. Bots are harder to detect than viruses or worms.
16. Software publishers often put links to software patches directly in an e-mail.
17. Bad bots were originally called remote-access Trojan horses.
18. Some worms can block users from accessing certain Web sites and can change the home page settings
of a computer.
19. A denial-of-service attack disables your antivirus software on your computer.
20. A polymorphic virus mutates by changing its signature to escape detection.
21. When you receive an e-mail about a virus, you should follow the instructions in it to protect yourself
from contracting the virus.
22. A checksum is a calculation of bytes used to identify a known virus.
23. The Windows Registry is always open, so it may not be copied by backup software without being
directed to.
24. A full backup makes copies of every file on your computer.
25. An incremental backup makes a backup of only the files that were added or changed since your last
full backup session.
page-pf3
26. Because it saves you time in the event your hard drive fails, it is recommended that you perform a full
backup every day.
27. The best place to store your backup disks is right next to the computer.
28. Because they store your files remotely, a Web site offering fee-based backup storage is a good place to
store all of your backup files.
29. The Windows XP Backup Utility creates a set of discs called a recovery CD.
30. The type of backup software you use depends on the storage media you choose.
31. A good place to store your backup software is on your backup disks.
32. In the figure above, a computer system is infected by a worm.
page-pf4
33. In the figure above, an incremental backup is performed and restored.
MULTIPLE CHOICE
1. MTBF is a rating that attempts to measure the time before a(n) ____ failure occurs.
a.
hardware
c.
power
b.
software
d.
operator
2. A power ____ can be caused by a malfunction in the power distribution network.
a.
failure
c.
voltage
b.
surge
d.
error
3. ____ is the term used to describe the infliction of viruses and worms to destroy data and interrupt
computer functioning.
a.
Hacking
c.
Operator error
b.
Cyberterrorism
d.
Critical data loss
4. Which of the following is NOT a category of preventative countermeasures against computer threats?
a.
deterrents
c.
corrective procedures
b.
detection activities
d.
botnets
5. Direct source input devices, including ____, collect data directly from a document or object.
a.
bar code readers
c.
firewalls
b.
biometrics
d.
surge strips
page-pf5
6. A ____ is a program that seems to perform one function, while actually doing something else.
a.
malicious
c.
macro
b.
worm
d.
Trojan horse
7. A ____ is one term for someone who uses computers to gain unauthorized access, steal information, or
crash a computer system.
a.
cracker
c.
worm
b.
Trojan horse
d.
bot
8. A virus that overwhelms a network’s capacity is called a(n) ____ attack.
a.
boot sector
c.
payload
b.
malicious
d.
denial-of-service
9. Which of the following is NOT one of the steps a worm makes when infecting a computer system?
a.
Propagates while looking for other hosts.
c.
Creating a backdoor.
b.
Entering the host computer through
e-mail.
d.
Invading unprotected hosts through e-mail
10. Which of the following is NOT an example of a mass-mailing worm?
a.
Beagle
c.
MyDoom
b.
Bagle
d.
Padodor
11. Which of the following is a common source of viruses?
a.
Removable storage media
c.
HTML code in e-mails
b.
Noncommercial CDs
d.
All of the above can contain viruses.
12. A(n) ____ virus deletes the files containing virus descriptions from your antivirus software.
a.
bot
c.
retro
b.
ransomware
d.
spam
13. ____ is malicious code that encrypts documents and files.
a.
Keylogger
c.
Retro virus
b.
Ransomware
d.
Trojan horse
14. Which of the following is NOT true about bots?
a.
They are easier to detect than viruses.
c.
They can perform good tasks, such as
searching for available jobs.
b.
They can be used to link together infected
computers.
d.
They can gain access through security
holes in an operating system.
page-pf6
15. A(n) virus ____ is a unique series of bytes used to identify a known virus.
a.
fingerprint
c.
signature
b.
ID
d.
definition
16. A virus ____ is a file that your antivirus software uses to identify and eradicate viruses.
a.
signature
c.
checksum
b.
definition
d.
patch
17. A(n) ____ virus could infect different targets in order to escape detection.
a.
Trojan horse
c.
multi-partite
b.
polymorphic
d.
stealth
18. A(n) ____ virus removes its signatures from a disk-based file and conceals itself in memory.
a.
Trojan horse
c.
stealth
b.
multi-partite
d.
polymorphic
19. A(n) ____ backup contains a copy of every program, data, and system file on a computer.
a.
restoration
c.
differential
b.
bootstrap
d.
full
20. The Windows ____ is a file that stores configuration information about the devices and software
installed on a computer system.
a.
root directory
c.
Registry
b.
backup
d.
Explorer
21. A(n) ____ backup makes a backup of the files that changed since the last backup, no matter what type
of backup it was.
a.
incremental
c.
partial
b.
differential
d.
restoration
22. If your hard drive crashes, first restore the files from your last full backup, then from your last ____
backup.
a.
partial
c.
differential
b.
restoration
d.
registry
23. When storing your backup files on a LAN, consider each of the following EXCEPT:
a.
The size of your backup files.
c.
That the server is backed up regularly.
b.
Password-protected folders to prevent
d.
You should consider all of the above.
page-pf7
unauthorized access.
24. Which of the following is NOT true about recovery CDs?
a.
Windows XP’s backup software creates
Automated System Recover discs.
c.
Some will wipe out all of your data.
b.
They contain only the operating system
kernel.
d.
They are sometimes included with a new
computer system.
25. A facility that contains its own power grid and security features in order to safely house computer
systems and information is called a(n) ____ center.
a.
data
c.
recovery
b.
information
d.
disaster
26. In the figure above, the worm enters the original host and other unprotected hosts using ____.
a.
infected files
c.
e-mail
b.
a backdoor
d.
a packet
page-pf8
27. In the figure above, a(n) ____ backup is performed and restored.
a.
full
c.
differential
b.
incremental
d.
registry
28. In the figure above, a(n) ____ backup is performed and restored.
a.
full
c.
differential
b.
incremental
d.
registry
COMPLETION
1. Human error, also called ____________________ error, includes entering inaccurate data or not
following procedures.
page-pf9
2. A power ____________________ is a complete loss of power to a computer system.
3. ____________________ is a security feature that verifies that the person accessing the data is the
person who has the access.
4. A ____________________ protector is an appliance that protects devices from voltage spikes.
5. Data backups and disaster recovery plans are examples of ____________________ procedure
countermeasures against computer threats.
6. Hand-geometry scanners and voice recognition are examples of ____________________ devices.
7. A(n) ____________________ is what a virus may deliver to your computer.
8. A(n) ____________________ virus infects a miniature program used to automate document and
worksheet production.
9. A(n) ____________________ is a capability of a Trojan horse that allows hackers to remotely access,
download, and execute files on your computer.
page-pfa
10. A(n) ____________________ threat is a term where more than one type of malicious program is used
to disrupt a computer system.
11. Any software that can autonomously execute a task when commanded to do so is called a(n)
____________________ agent.
12. A(n) ____________________ can be used to search the Web to assemble data for search engines or
monitor chat groups for offensive language.
13. A network of bot-infested computers is called a(n) ____________________.
14. ____________________ is malicious code that encrypts documents and other files and demands
payment for the encryption key.
15. A(n) ____________________ is the calculation of the binary values of the bytes in a file.
16. A(n) ____________________ virus removes its signature and conceals itself in memory.
17. A(n) virus ____________________ is an e-mail with drastic instructions to take to protect yourself
against a virus threat.
page-pfb
18. A(n) ____________________ backup makes a copy of every file in the folders on your computer.
19. A(n) ____________________ disc is a CD or DVD that contains the operating system files needed to
start your computer without accessing the hard disk.
20. A(n) ____________________ center is a specialized facility that houses and protects computer
systems and information.
21. A barebones boot disc simply loads the operating system ____________________.
22. In the figure above, the computer system is infected by a ____________________.
MATCHING
page-pfc
Match the computer virus term with its definition.
a.
Hacker
d.
Backdoor
b.
Payload
e.
Keylogger
c.
Trigger event
f.
Malicious code
1. Anyone who uses computers to gain unauthorized access or crash a computer system.
2. Allows remote access to a computer.
3. Any program that enters a computer without the user’s knowledge.
4. A date programmed into a virus that indicates when it will unleash.
5. Delivered by a virus; could be as simple as displaying an annoying message.
6. A program that can record as you type in order to steal passwords.
Match the storage device with its description.
a.
Removable hard disk
d.
Web site
b.
Zip disk
e.
CD-R
c.
USB Flash drive
f.
Tape
7. Security and privacy of data are a concern.
8. Convenient and durable, but expensive.
9. Fast, limited capacity, but disks can be secured remotely.
10. Holds more than a floppy disk, but full backup still requires multiple disks.
11. Most convenient, but expensive for capacity equal to today’s hard drives.
12. Limited capacity, long shelf life, cannot be reused.
ESSAY
1. Describe some of the threats to computer systems and data that should be considered when developing
a risk management plan.
page-pfd
2. List four measures you can take to protect your computer from threats.
3. List three symptoms that your computer may be infected with a virus.
4. List three ways to prevent your computer from becoming infected with a virus.
page-pfe
5. Describe the questions you need to consider when choosing a backup strategy.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.