CS200-Chapter10-Homework

Similar documents
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Computers and Society: Security and Privacy

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

COB 302 Management Information System (Lesson 8)

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Section 12 MUST BE COMPLETED BY: 4/22

CHAPTER 10: COMPUTER SECURITY AND RISKS

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Malware & Botnets. Botnets

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Chapter Eleven. Computer Security and Safety, Ethics, and Privacy

Chapter 10. Privacy and Security. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Information Security Policy

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

How are we keeping Hackers away from our UCD networks and computer systems?

BE SAFE ONLINE: Lesson Plan

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Security Basics: A Whitepaper

Infocomm Sec rity is incomplete without U Be aware,

NATIONAL CYBER SECURITY AWARENESS MONTH

Austin Peay State University

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

ViRobot Desktop 5.5. User s Guide

E-Business, E-Commerce

E-BUSINESS THREATS AND SOLUTIONS

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

REGION 19 HEAD START. Acceptable Use Policy

How to stay safe online

Chapter 9: Network and Internet Security

Network Security: Introduction

SITECATALYST SECURITY

Network Incident Report

Don t Fall Victim to Cybercrime:

ESET SMART SECURITY 6

Cyber Security Awareness

Desktop and Laptop Security Policy

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

BSHSI Security Awareness Training

E Commerce and Internet Security

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Penetration Testing Service. By Comsec Information Security Consulting

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

INFORMATION SECURITY FOR YOUR AGENCY

COMPUTER-INTERNET SECURITY. How am I vulnerable?

FORBIDDEN - Ethical Hacking Workshop Duration

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management


Cyber Security Awareness

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Top tips for improved network security

The Information Security Problem

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

Paul Nguyen CSG Interna0onal

McAfee Internet Security Suite Quick-Start Guide

AASTMT Acceptable Use Policy

Evaluating the Perceptions of People towards Online Security

Different Types of Adware and Services

Session 46 Information Security Creating Awareness, Educating Staff, and Protecting Information

Network Security and the Small Business

NC DPH: Computer Security Basic Awareness Training

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Acceptable Use Policy

Chapter 15: Computer Security and Privacy

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Acceptable Use Policy

Acceptable Use Policy Revision date: 26/08/2013

region16.net Acceptable Use Policy ( AUP )

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

ELECTRONIC INFORMATION SECURITY A.R.

Data Security 2. Implement Network Controls

White Paper. Information Security -- Network Assessment

Network Security Policy

National Cyber Security Month 2015: Daily Security Awareness Tips

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Systems Design. Systems Design. Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics.

Acceptable Use Policy

Data Management & Protection: Common Definitions

Managed Security Services

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Information Technology Cyber Security Policy

Transcription:

Class: Date: CS200-Chapter10-Homework Multiple Choice Identify the choice that best completes the statement or answers the question. 1. A(n) is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. a. security c. terrorism b. liability d. network 2. Any illegal act involving a computer generally is referred to as a. a. cyberthreat c. malware b. computer crime d. hoax 3. The term refers to online or Internet-based illegal acts. a. malware c. cybercrime b. cyberthreat d. cyberextortion 4. A(n) has the same intent as a cracker but does not have the technical skills and knowledge. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist 5. A(n) is someone who uses e-mail as a vehicle for extortion. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist 6. A(n) is someone who uses the Internet or network to destroy or damage computers for political reasons. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist 7. A(n) is the destructive event or prank malware is intended to deliver. a. payload c. spoof b. hoax d. rebuke 8. All of the following are common ways computers become infected with malware, except. a. opening infected files b. running an infected program c. booting the computer with infected removable media inserted in a drive or plugged in a port d. installing a software package from a CD 9. Currently, more than known viruses, worms, and Trojan horse programs exist. a. 11,000 c. 151,000 b. 22,000 d. 180,000 10. In applications that allow users to write, the security level should be set so the application warns users that a document they are attempting to open contains a macro. a. Javascript c. antivirus definitions b. macros d. antispyware definitions 1

11. protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. a. An anti-spam program c. An antivirus program b. E-mail encryption d. E-mail filtering 12. If an antivirus program cannot remove an infection, it often. a. quarantines the infected file c. disables the drive the file is on b. reports the user computer d. removes the user from its registry 13. A virus hoax often is in the form of a(n). a. photo attachment c. chain letter b. newsletter d. advertisement 14. is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. a. Rebuking c. Transmitting b. Spoofing d. Victimizing 15. All networked and online computer users should implement a like the one shown in the accompanying figure. a. firewall solution c. DoS attack b. back door d. all of the above 16. As shown in the accompanying figure, a is hardware and/or software that protects a network s resources from intrusion by users on another network such as the Internet. a. quarantine c. firewall b. biometric device d. router 2

17. detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure. a. Violation c. Intrusion b. Password d. Traffic 18. is a server outside a company s network that controls which communications pass into the company s network. a. A firewall c. A proxy server b. Intrusion detection software d. An audit trail 19. Which of the following is not true of intrusion detection software? a. It is complex. c. It is inexpensive. b. It is difficult to interpret. d. It is not designed for home use. 20. Many systems implement access controls using a two-phase process called. a. access or deny c. access and approval b. identification and authentication d. identification and approval 21. If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is. a. 1 second c. 7 minutes b. 30 seconds d. 2 hours 22. As shown in the accompanying figure, many Web sites require a user to enter a user, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. a. term c. name b. link d. key 3

23. As shown in the accompanying figure, many Web sites require a user to enter a(n), which is a private combination of characters associated with a user name that allows access to certain computer resources. a. PIN c. secure key b. password d. passterm 24. Which of the following is an example of a possessed object? a. user name and password c. badges and keys b. face recognition systems d. fingerprint scanner 25. Which of the following is not an example of a biometric device? a. smart card c. hand geometry system b. face recognition system d. fingerprint scanner 4

26. A(n) device like the one in the accompanying figure authenticates a person s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. a. authentication c. identification b. personal d. biometric 27. theft is the act of stealing computer equipment. a. Hardware c. SMS b. Cyber d. Software 28. Software occurs when someone steals software media, intentionally erases programs, or illegally copies a program. a. theft c. piracy b. extortion d. terrorism 5

29. To protect themselves from software piracy, software manufacturers issue a(n) agreement like the one shown in the accompanying figure, which gives users the right to use the software. a. intellectual property c. access b. license d. copyright 30. occurs when someone steals personal or confidential information. a. Plagiarism c. Information theft b. Decryption d. Cyberpiracy 31. Which method of encryption inserts characters between existing characters? a. transposition c. expansion b. substitution d. compaction 6

32. can lead to system failure. a. Aging hardware b. Natural disasters, such as fires, floods, or hurricanes c. Errors in computer programs d. All of the above 33. A(n) is the prolonged malfunction of a computer. a. hardware vandalism c. unauthorized access b. system failure d. software theft 34. A(n) protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment. a. Joule c. surge b. spike d. hash 35. A(n) is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. a. TSR c. RIT b. RSI d. TRI 36. Computer are the moral guidelines that govern the use of computers and information systems. a. logistics c. ethics b. mechanics d. rights 37. Information refers to the right of individuals and companies to deny or restrict the collection and use of information about them. a. rights c. restrictions b. acceptable use d. privacy 7

38. As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called. a. spyware c. cookies b. spam d. adware 39. Social engineers can obtain information by. a. snooping around computers looking for openly displayed confidential information b. watching or filming people dialing telephone numbers or using ATMs c. sifting through company dumpsters d. all of the above 40. As related to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. a. DoS c. DRM b. social engineering d. scamming True/False Indicate whether the statement is true or false. 41. Computer crime refers to online or Internet-based illegal acts. 42. The term, cracker, originally was a complimentary word for a computer enthusiast. 8

43. Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and access files on the remote computer. 44. Most antivirus programs do not provide updated virus signature files for users. 45. Shrink-wrapped software from major developers does not need to be scanned for infections. 46. A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. 47. The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities. 48. Some operating systems, such as Windows, include personal firewalls like the ones shown in the accompanying figure. 49. Companies should review successful access attempts for irregularities. 9

50. Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure. 51. Hackers use computer automated tools to assist them with guessing passwords like the one shown in the accompanying figure. 52. If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one. 53. Physical access controls, such as locked doors and windows, usually are adequatre to protect computer equipment from hardware theft. 54. For visually impaired users, the CAPTCHA text can be read aloud. 10

55. With a license agreement like the one shown in the accompanying figure, the user becomes the owner of the software. 56. Software users with a EULA like the one in the accompanying figure may make as many backup copies of the software as they want. 57. An encryption key often uses a combination of encryption methods. 58. Electrical power variation is one of the least common causes of system failure. 59. If computer equipment is networked, a single power disturbance can damage multiple systems. 60. With a selective backup, users decide which folders and files to include in a backup. 61. Wireless access poses additional security risks. 11

62. To access a wireless network, perpetrators must be in the range of the wireless network. 63. Copyright law gives the public fair use to copyrighted material. 64. If you disable cookie use, you will not be able to use many of the e-commerce Web sites. 65. Spam is a program placed on a computer without the user s knowledge that secretly collects information about the user. 12