Deck 5: Digital Security Ethics and Privacy
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 5: Digital Security Ethics and Privacy
1
A(n) ______ has a goal of destroying data or stealing information.
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
B
2
COGNITIVE ASSESSMENT What should an AUP specify?
A) The acceptable use of technology by employees for personal reasons.
B) The guidelines for using licensed software.
C) A list of IP addresses known to be safe.
D) A user's personal authentication methods.
A) The acceptable use of technology by employees for personal reasons.
B) The guidelines for using licensed software.
C) A list of IP addresses known to be safe.
D) A user's personal authentication methods.
A
3
Another term for botnet is ______ army.
A) ghost
B) vampire
C) zombie
D) spy
A) ghost
B) vampire
C) zombie
D) spy
C
4
COGNITIVE ASSESSMENT You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
A) worm
B) rootkit
C) trojan horse
D) virus
A) worm
B) rootkit
C) trojan horse
D) virus
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
COGNITIVE ASSESSMENT Which of the following best describes a back door?
A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
A password ______ is a service that stores all of your account information securely.
A) vault
B) binder
C) manager
D) collection
A) vault
B) binder
C) manager
D) collection
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Malware is short for ______ software.
A) malicious
B) malignant
C) malevolent
D) malady
A) malicious
B) malignant
C) malevolent
D) malady
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
COGNITIVE ASSESSMENT You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
A) worm
B) rootkit
C) trojan horse
D) virus
A) worm
B) rootkit
C) trojan horse
D) virus
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following best describes a single sign on account?
A) A security measure that allows only one failed login attempt.
B) An individual's unique identity required to access an organization's network.
C) When you enter your name into one account and you are automatically signed into other accounts and services.
D) An organization's shared login credentials for general network access.
A) A security measure that allows only one failed login attempt.
B) An individual's unique identity required to access an organization's network.
C) When you enter your name into one account and you are automatically signed into other accounts and services.
D) An organization's shared login credentials for general network access.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
What is an audit trail?
A) A log of financial transactions.
B) A file that records access attempts.
C) A list of passwords and user names on a network.
D) A record of hacking attempts.
A) A log of financial transactions.
B) A file that records access attempts.
C) A list of passwords and user names on a network.
D) A record of hacking attempts.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
A) devastating
B) enterprise
C) organized
D) distributed
A) devastating
B) enterprise
C) organized
D) distributed
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
An iris recognition system uses technology to read patterns in the user's ______.
A) eye
B) fingerprints
C) signature
D) face
A) eye
B) fingerprints
C) signature
D) face
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ______ demands payment to stop an attack.
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
A) control
B) firewall
C) check
D) lock
A) control
B) firewall
C) check
D) lock
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
PIN stands for personal identification ______.
A) number
B) name
C) network
D) note
A) number
B) name
C) network
D) note
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
Passcode is another term for a(n) ______.
A) user name
B) encryption algorithm
C) passphrase
D) PIN
A) user name
B) encryption algorithm
C) passphrase
D) PIN
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?
A) Avoid games requiring passwords to be saved to an online account on a smartphone.
B) Look for games that use ActiveX or JavaScript, as these are always safe.
C) Check the developer of any software or apps to be certain it is legitimate.
D) Use a firewall when using multiplayer online games.
A) Avoid games requiring passwords to be saved to an online account on a smartphone.
B) Look for games that use ActiveX or JavaScript, as these are always safe.
C) Check the developer of any software or apps to be certain it is legitimate.
D) Use a firewall when using multiplayer online games.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ______ was originally a complimentary work for a computer enthusiast.
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ______ often uses prewritten hacking and cracking programs.
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
A) hacker
B) cracker
C) script kiddie
D) cyberextortionist
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
Badges, cards, smart cards, and keys are examples of _____ objects.
A) wearable
B) carried
C) possessed
D) pocket
A) wearable
B) carried
C) possessed
D) pocket
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
An encryption ______ is a set of steps that converts readable text into unreadable text.
A) series
B) algorithm
C) method
D) key
A) series
B) algorithm
C) method
D) key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is not recommended to protect against hardware failure?
A) surge protector
B) UPS
C) cables and locks
D) duplicate components
A) surge protector
B) UPS
C) cables and locks
D) duplicate components
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
A) IP
B) EULA
C) electronic profile
D) code of conduct
A) IP
B) EULA
C) electronic profile
D) code of conduct
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
Common digital security risks include information theft and system failure.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Critical Thinking Questions Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
A) always stay connected to the Internet
B) use a firewall
C) be cautious when clicking links in email
D) never click OK in a pop-up spyware window
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
A) always stay connected to the Internet
B) use a firewall
C) be cautious when clicking links in email
D) never click OK in a pop-up spyware window
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
COGNITIVE ASSESSMENT You want to ensure your wireless network is secure. Which of the following should you NOT do?
A) Retain the default administrative password.
B) Choose a secure location for your wireless router.
C) Broadcast the SSID.
D) Enable an encryption method such as WPA2.
A) Retain the default administrative password.
B) Choose a secure location for your wireless router.
C) Broadcast the SSID.
D) Enable an encryption method such as WPA2.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Critical Thinking Questions Case 5-2
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
Which of the following is NOT true about cloud data privacy?
A) Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
B) The company storing the data must protect against data loss due to physical disasters.
C) When transferring data over a network to the cloud, the data should be encrypted and authenticated.
D) Cloud storage companies have increased their privacy and security features in recent years.
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
Which of the following is NOT true about cloud data privacy?
A) Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
B) The company storing the data must protect against data loss due to physical disasters.
C) When transferring data over a network to the cloud, the data should be encrypted and authenticated.
D) Cloud storage companies have increased their privacy and security features in recent years.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ______ backup copies only the files that have changed since the last full backup.
A) differential
B) incremental
C) selective
D) partial
A) differential
B) incremental
C) selective
D) partial
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
COGNITIVE ASSESSMENT Which of the following is NOT true about two-step verification?
A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.
A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
Critical Thinking Questions Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.
A) shield
B) firewall
C) back door
D) blocker
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.
A) shield
B) firewall
C) back door
D) blocker
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
Critical Thinking Questions Case 5-2
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______.
A) criminal records
B) students' educational records
C) financial transactions
D) user names and passwords
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______.
A) criminal records
B) students' educational records
C) financial transactions
D) user names and passwords
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
What does a keygen do?
A) Generates a list of user names and passwords for network administrators.
B) Creates CAPTCHA images.
C) Analyzes typing patterns to authenticate a user.
D) Creates software registration numbers.
A) Generates a list of user names and passwords for network administrators.
B) Creates CAPTCHA images.
C) Analyzes typing patterns to authenticate a user.
D) Creates software registration numbers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
A) password
B) algorithm
C) code
D) key
A) password
B) algorithm
C) code
D) key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
COGNITIVE ASSESSMENT If the web address of a website begins with https instead of http, what do you know about the website?
A) It likely is spoofed.
B) It is secure.
C) It provides security services and information.
D) It contains encrypted data.
A) It likely is spoofed.
B) It is secure.
C) It provides security services and information.
D) It contains encrypted data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.
A) manipulation
B) engineering
C) hacking
D) misdirection
A) manipulation
B) engineering
C) hacking
D) misdirection
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
COGNITIVE ASSESSMENT An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?
A) emergency plan
B) recovery plan
C) restoration plan
D) building plan
A) emergency plan
B) recovery plan
C) restoration plan
D) building plan
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is not a green computing recommendation?
A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.
A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
For what purpose was the BSA formed?
A) To promote understanding of software piracy.
B) To fight against hacktivists.
C) To create an online resource for malware protection.
D) To enforce laws against cyberterrorists.
A) To promote understanding of software piracy.
B) To fight against hacktivists.
C) To create an online resource for malware protection.
D) To enforce laws against cyberterrorists.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
COGNITIVE ASSESSMENT Which of the following is NOT true about CAPTCHAs?
A) A CAPTCHA is an image containing a series of distorted characters.
B) CAPTCHAs were developed to verify input is coming from computer programs, not humans.
C) The CAPTCHA text can be read aloud for visually impaired users.
D) You have the option of generating a new CAPTCHA.
A) A CAPTCHA is an image containing a series of distorted characters.
B) CAPTCHAs were developed to verify input is coming from computer programs, not humans.
C) The CAPTCHA text can be read aloud for visually impaired users.
D) You have the option of generating a new CAPTCHA.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is NOT a part of a typical single-user license agreement?
A) You can make one copy of the software as a backup.
B) You can rent or lease the software.
C) You cannot install the software on a network.
D) You cannot export the software.
A) You can make one copy of the software as a backup.
B) You can rent or lease the software.
C) You cannot install the software on a network.
D) You cannot export the software.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
Passphrases are less secure than passwords.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
To protect files on your device's hard drive from hackers, turn on file and printer sharing.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
A rootkit can be a backdoor.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Piracy is the most common form of software theft.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Intentionally erasing software is not an example of software theft.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
User IDs are also called user names, log on names, or sign in names.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
Employers can use firewalls to restrict employees' access to sensitive data.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Viruses, worms, and trojan horses replicate themselves to other computers or devices.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
Encryption is one safeguard against information theft.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
Two users can have the same email address.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
Security experts recommend using different user names and passwords for every account.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
The website for CERT/CC provides information about Internet security breaches.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
Software used to fight cybercriminals is called crimeware.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Public key encryption is also called asymmetric key encryption.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
A hand geometry system measures the size and shape of a person's hand.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Email spoofing rarely is used in virus hoaxes and spam.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
Fingerprint readers are examples of ______ devices.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
What methods do phishing and spoofing scammers use? List methods to protect against phishing and spoofing scams.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
List methods to protect computers, mobile devices, and networks from attacks.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
Describe the reasons for and methods of two-step verification processes. What information should a user use to register?
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ______ is a program that performs a repetitive task on a network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
You should disable GPS tracking on your mobile device unless you need to use it.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
Describe and list advantages and disadvantages of each of the following backup types: full, differential, incremental, selective, CPD, and cloud.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
Content filtering is the process of restricting access to certain material.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
The destructive event or prank a malware delivers is its ______.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
The term ______ refers to online or Internet-based illegal acts.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
Describe how users and manufacturers protect against software theft.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ______ verification system compares a person's live speech with their stored speech pattern.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
With CDP, all data is backed up whenever a change is made.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
An access ______ is a security measure that defines who can access a computer, device, or network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck