Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
116 views5 pages

Week9 Quiz

This document provides a summary of key topics covered in Week 9 of the ITS100 course on digital security, ethics, and privacy threats, issues, and defenses. Some key topics covered include social engineering, differential backups, encryption, cyber extortionists, password managers, and ensuring wireless network security. It also reviews important security concepts like two-factor authentication, malware risks, and the functions of acceptable use policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views5 pages

Week9 Quiz

This document provides a summary of key topics covered in Week 9 of the ITS100 course on digital security, ethics, and privacy threats, issues, and defenses. Some key topics covered include social engineering, differential backups, encryption, cyber extortionists, password managers, and ensuring wireless network security. It also reviews important security concepts like two-factor authentication, malware risks, and the functions of acceptable use policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

[ITS100] INTRODUCTION TO INFORMATION TECHNOLOGY

WEEK 9
COVERAGE: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses

A(n) ______ has a goal of destroying data or stealing information.

ANSWER: cracker

A password ______ is a service that stores all of your account information securely.

ANSWER: manager

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by


taking advantage of another person.

ANSWER: engineering

A session cookie stores user names and/or passwords so that users do not need to enter this
information every time they sign in to the website.

ANSWER: False

A(n) ______ backup copies only the files that have changed since the last full backup.

ANSWER: differential

Software used to fight cybercriminals is called crimeware.

ANSWER: False

Encryption is one safeguard against information theft.

ANSWER: True

PIN stands for personal identification ______.

ANSWER: number
Another term for botnet is ______ army.

ANSWER: zombie

Intentionally erasing software is not an example of software theft.

ANSWER: False

If your computer's operating system provides a personal firewall, you do not need to disable it if you are
using a third-party firewall.

ANSWER: False

A hand geometry system measures the size and shape of a person's hand.

ANSWER: True

You should disable GPS tracking on your mobile device unless you need to use it.

ANSWER: True

Two users can have the same email address.

ANSWER: False

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain
action.

ANSWER: lock

The website for CERT/CC provides information about Internet security breaches.

ANSWER: True

A(n) ______ demands payment to stop an attack.

ANSWER: cyberextortionist
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the
recipient of the data uses to decrypt.

ANSWER: key

A rootkit can be a backdoor.

ANSWER: True

What is an audit trail?

ANSWER: A file that records access attempts

You want to ensure your wireless network is secure. Which of the following should you NOT do?

ANSWER: Broadcast the SSID

An organization creates a disaster recovery plan. Which part would include return procedures (who can
enter the facility, and what actions they are to perform)?

ANSWER: emergency plan

Which of the following is NOT true about CAPTCHAs?

ANSWER: CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Which of the following is NOT true about two-step verification?


ANSWER: When a system sends an authentication code, it typically does not expire.

You realize your computer has been infected with malware. It seems as if someone is controlling your
computer from a remote location. What type of malware might you have?
ANSWER: rootkit

Badges, cards, smart cards, and keys are examples of _____ objects.
ANSWER: possessed
Common digital security risks include information theft and system failure.
ANSWER: True

Which of the following best describes a back door?


ANSWER: A program or set of instructions that allows user to bypass security controls when accessing a
program, computer, or network.

If the web address of a website begins with https instead of http, what do you know about the website?
ANSWER: It is secure.

Content filtering is the process of restricting access to certain material.


ANSWER: True

A password ______ is a service that stores all of your account information securely.
ANSWER: manager

You realize your computer has been infected with malware. The program has been copying itself
repeatedly, using up resources. What type of malware might you have?
ANSWER: worm

You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
ANSWER: always stay connected to the Internet

An iris recognition system uses technology to read patterns in the user's ______.
ANSWER: eye

What should an AUP specify?


ANSWER: The acceptable use of technology by employees for personal reasons.
A session cookie stores user names and/or passwords so that users do not need to enter this information
every time they sign in to the website.
ANSWER: False

Which of the following is NOT a recommended practice for gaming safety?


ANSWER: Look for games that use ActiveX or JavaScript, as these are always safe.

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or
allowed/not allowed.
ANSWER: code of conduct

An encryption ______ is a set of steps that converts readable text into unreadable text.
ANSWER: encryption

You might also like