Deck 31: Security, Privacy, and Ethics Online

Full screen (f)
exit full mode
Question
Phishing is a way hackers can trick e-mail users into sharing personal information. ____________________
Use Space or
up arrow
down arrow
to flip the card.
Question
A site license is needed when you purchase software for your home computer.
Question
A cookie is an important file stored on your desktop that collects keystroke information.
Question
Two-step verification requires more than just a password to authenticate your identity on a Web site.
Question
Keylogging is a way to block content being passed through the Internet. _______________________
Question
A ____ is a malicious program that records your keystrokes to keep track of information such as credit card and account numbers.

A) keylogger
B) hijacker
C) spyware
D) sniffer
Question
Public domain software provides remote access to software applications on the Internet. ____________________
Question
A time bomb virus replicates itself and consumes the computer's resources, resulting in a computer slowdown.
Question
If a network is small, a(n) hardware firewall is sufficient. _______________________
Question
Identity theft is an example of unethical behavior.
Question
A strong password contains all of the following EXCEPT: ____.

A) personal information, such as a birth date
B) at least eight characters
C) at least one special character, such as @ or *
D) letters and numbers
Question
An End User License Agreement is a contract between you and your Internet service provider.
Question
Computer hacking involves invading someone else's computer without his or her permission. _______________________
Question
A virus is a program written by a hacker to corrupt data on a computer.
Question
Which of the following is NOT true regarding computer hacking?

A) The FBI has a cybercrime branch.
B) Hackers are usually computer novices.
C) Hackers steal, change, or damage data.
D) Hacking causes millions of dollars of damage each year.
Question
A software firewall is more secure and easier to monitor for large networks.
Question
SSL technology is used to wipe data from your computer so you can reformat the hard drive.
Question
An ergonomic workstation requires a wireless connection.
Question
Which of the following is NOT a guideline for using network protection?

A) Reset any default passwords on your wireless router.
B) Enable encryption software.
C) Create strong passwords.
D) Keep your network running at all times.
Question
In the workplace, turning on _____ controls who can use the Internet and when.

A) spyware
B) malware
C) filtering
D) keylogging
Question
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. The best position for a monitor is _____.

A) directly in front of the user, with the bottom of the monitor positioned at eye level
B) to the left of the user, with the top of the monitor positioned at eye level
C) to the right of the user, with the monitor centered at eye level
D) directly in front of the user, with the top of the monitor positioned at eye level
Question
Which of the following is NOT a type of virus?

A) worm
B) Trojan horse
C) time bomb
D) cookie
Question
Joanna is a responsible and secure computer user. Joanna wants to make sure her password is strong, so she does all of the following EXCEPT: ______.

A) uses a number she can easily remember like her birthdate
B) includes at least one letter, number, and special character
C) uses at least 8 characters
D) uses upper- and lowercase letters
Question
A ____ program can take control of your browser.

A) keylogger
B) hijacker
C) spyware
D) sniffer
Question
A(n) ____________________ can provide a Web site owner with information about you and your preferences.
Question
_______________________ design adapts equipment and the workplace to fit the worker and helps prevent RSIs.
Question
When a URL begins with https://, it indicates the Web site is _____.

A) phishing for information
B) filtered
C) secure
D) backed up
Question
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. Abby tells employees that they should do all of the following EXCEPT: ____.

A) Use keyboard trays, if possible.
B) Sit at least 20 inches away from the computer screen.
C) When they find a computer position that feels comfortable, sit in the same position for your entire computer session.
D) Be sure not to obstruct air vents on your notebook computer.
Question
_____ technology uses public key encryption.

A) Send Secure Layer
B) Safe Secure Locket
C) Sensitive Layer Locket
D) Secure Sockets Layer
Question
Joanna is a responsible and secure computer user. Joanna knows that all of the following are true about securing data EXCEPT: ____.

A) Companies often establish password-protected locations on hard drives.
B) It is always evident when some kind of computer crime or intrusion has occurred.
C) Unauthorized access is more likely to occur by people gaining access through a written or shared password than by people guessing your username or password.
D) You should change your password frequently.
Question
An electronic document called a(n) ____________________ verifies the identity of a person or company and confirms that they own a public key.
Question
A virus that releases itself on a specific date is called a(n) ____________________.
Question
Reproducing and distributing music without the permission of the artist is called software ____________________.
Question
<strong>  The accompanying figure shows a workstation that ____.</strong> A) follows ergonomic design B) is protected by biometrics C) is likely to cause RSIs D) all of the above <div style=padding-top: 35px>
The accompanying figure shows a workstation that ____.

A) follows ergonomic design
B) is protected by biometrics
C) is likely to cause RSIs
D) all of the above
Question
Explain the purpose of an End User License Agreement. List three different types of software licensing available and how they work.
Question
<strong>  The accompanying figure shows a likely ____ scheme.</strong> A) sniffing B) phishing C) hijacking D) adware <div style=padding-top: 35px>
The accompanying figure shows a likely ____ scheme.

A) sniffing
B) phishing
C) hijacking
D) adware
Question
Which of the following is true about viruses?

A) Viruses are attached to files.
B) You can inadvertently run a virus program by opening an e-mail message or attachment.
C) To protect against viruses, you should use strong passwords.
D) All of the above are true.
Question
A _____ is an act intended to deceive or defraud users.

A) virus
B) sniffer
C) hoax
D) hacker
Question
Which of the following is NOT an acceptable way to protect a system?

A) Update software once a year.
B) Install the latest security updates for your operating system.
C) Set strong passwords.
D) Install antivirus software.
Question
Which of the following is NOT true about securing data?

A) Use an alias when communicating on a blog or social network.
B) The security and privacy of personal information on the Internet is getting worse all the time.
C) Verify that you log off a computer used in a public place such as a library.
D) All of the above are true.
Question
Match between columns
A network security feature
TLS
A network security feature
SIM card
A network security feature
Firewall
A network security feature
Private key
A network security feature
Public key
A certificate for sites that process sensitive data
TLS
A certificate for sites that process sensitive data
SIM card
A certificate for sites that process sensitive data
Firewall
A certificate for sites that process sensitive data
Private key
A certificate for sites that process sensitive data
Public key
Decrypts information
TLS
Decrypts information
SIM card
Decrypts information
Firewall
Decrypts information
Private key
Decrypts information
Public key
Holds personal identity information
TLS
Holds personal identity information
SIM card
Holds personal identity information
Firewall
Holds personal identity information
Private key
Holds personal identity information
Public key
Encrypts information
TLS
Encrypts information
SIM card
Encrypts information
Firewall
Encrypts information
Private key
Encrypts information
Public key
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 31: Security, Privacy, and Ethics Online
1
Phishing is a way hackers can trick e-mail users into sharing personal information. ____________________
True
2
A site license is needed when you purchase software for your home computer.
False
3
A cookie is an important file stored on your desktop that collects keystroke information.
False
4
Two-step verification requires more than just a password to authenticate your identity on a Web site.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
Keylogging is a way to block content being passed through the Internet. _______________________
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is a malicious program that records your keystrokes to keep track of information such as credit card and account numbers.

A) keylogger
B) hijacker
C) spyware
D) sniffer
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Public domain software provides remote access to software applications on the Internet. ____________________
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
A time bomb virus replicates itself and consumes the computer's resources, resulting in a computer slowdown.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
If a network is small, a(n) hardware firewall is sufficient. _______________________
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Identity theft is an example of unethical behavior.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
A strong password contains all of the following EXCEPT: ____.

A) personal information, such as a birth date
B) at least eight characters
C) at least one special character, such as @ or *
D) letters and numbers
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
An End User License Agreement is a contract between you and your Internet service provider.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
Computer hacking involves invading someone else's computer without his or her permission. _______________________
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
A virus is a program written by a hacker to corrupt data on a computer.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT true regarding computer hacking?

A) The FBI has a cybercrime branch.
B) Hackers are usually computer novices.
C) Hackers steal, change, or damage data.
D) Hacking causes millions of dollars of damage each year.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
A software firewall is more secure and easier to monitor for large networks.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
SSL technology is used to wipe data from your computer so you can reformat the hard drive.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
An ergonomic workstation requires a wireless connection.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a guideline for using network protection?

A) Reset any default passwords on your wireless router.
B) Enable encryption software.
C) Create strong passwords.
D) Keep your network running at all times.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
In the workplace, turning on _____ controls who can use the Internet and when.

A) spyware
B) malware
C) filtering
D) keylogging
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. The best position for a monitor is _____.

A) directly in front of the user, with the bottom of the monitor positioned at eye level
B) to the left of the user, with the top of the monitor positioned at eye level
C) to the right of the user, with the monitor centered at eye level
D) directly in front of the user, with the top of the monitor positioned at eye level
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is NOT a type of virus?

A) worm
B) Trojan horse
C) time bomb
D) cookie
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Joanna is a responsible and secure computer user. Joanna wants to make sure her password is strong, so she does all of the following EXCEPT: ______.

A) uses a number she can easily remember like her birthdate
B) includes at least one letter, number, and special character
C) uses at least 8 characters
D) uses upper- and lowercase letters
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ program can take control of your browser.

A) keylogger
B) hijacker
C) spyware
D) sniffer
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ can provide a Web site owner with information about you and your preferences.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
_______________________ design adapts equipment and the workplace to fit the worker and helps prevent RSIs.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
When a URL begins with https://, it indicates the Web site is _____.

A) phishing for information
B) filtered
C) secure
D) backed up
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. Abby tells employees that they should do all of the following EXCEPT: ____.

A) Use keyboard trays, if possible.
B) Sit at least 20 inches away from the computer screen.
C) When they find a computer position that feels comfortable, sit in the same position for your entire computer session.
D) Be sure not to obstruct air vents on your notebook computer.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
_____ technology uses public key encryption.

A) Send Secure Layer
B) Safe Secure Locket
C) Sensitive Layer Locket
D) Secure Sockets Layer
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
Joanna is a responsible and secure computer user. Joanna knows that all of the following are true about securing data EXCEPT: ____.

A) Companies often establish password-protected locations on hard drives.
B) It is always evident when some kind of computer crime or intrusion has occurred.
C) Unauthorized access is more likely to occur by people gaining access through a written or shared password than by people guessing your username or password.
D) You should change your password frequently.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
An electronic document called a(n) ____________________ verifies the identity of a person or company and confirms that they own a public key.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
A virus that releases itself on a specific date is called a(n) ____________________.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
Reproducing and distributing music without the permission of the artist is called software ____________________.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
<strong>  The accompanying figure shows a workstation that ____.</strong> A) follows ergonomic design B) is protected by biometrics C) is likely to cause RSIs D) all of the above
The accompanying figure shows a workstation that ____.

A) follows ergonomic design
B) is protected by biometrics
C) is likely to cause RSIs
D) all of the above
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
Explain the purpose of an End User License Agreement. List three different types of software licensing available and how they work.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
<strong>  The accompanying figure shows a likely ____ scheme.</strong> A) sniffing B) phishing C) hijacking D) adware
The accompanying figure shows a likely ____ scheme.

A) sniffing
B) phishing
C) hijacking
D) adware
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is true about viruses?

A) Viruses are attached to files.
B) You can inadvertently run a virus program by opening an e-mail message or attachment.
C) To protect against viruses, you should use strong passwords.
D) All of the above are true.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
A _____ is an act intended to deceive or defraud users.

A) virus
B) sniffer
C) hoax
D) hacker
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is NOT an acceptable way to protect a system?

A) Update software once a year.
B) Install the latest security updates for your operating system.
C) Set strong passwords.
D) Install antivirus software.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is NOT true about securing data?

A) Use an alias when communicating on a blog or social network.
B) The security and privacy of personal information on the Internet is getting worse all the time.
C) Verify that you log off a computer used in a public place such as a library.
D) All of the above are true.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
A network security feature
TLS
A network security feature
SIM card
A network security feature
Firewall
A network security feature
Private key
A network security feature
Public key
A certificate for sites that process sensitive data
TLS
A certificate for sites that process sensitive data
SIM card
A certificate for sites that process sensitive data
Firewall
A certificate for sites that process sensitive data
Private key
A certificate for sites that process sensitive data
Public key
Decrypts information
TLS
Decrypts information
SIM card
Decrypts information
Firewall
Decrypts information
Private key
Decrypts information
Public key
Holds personal identity information
TLS
Holds personal identity information
SIM card
Holds personal identity information
Firewall
Holds personal identity information
Private key
Holds personal identity information
Public key
Encrypts information
TLS
Encrypts information
SIM card
Encrypts information
Firewall
Encrypts information
Private key
Encrypts information
Public key
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.