[ITS100] INTRODUCTION TO INFORMATION TECHNOLOGY
WEEK 9
COVERAGE: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
A(n) ______ has a goal of destroying data or stealing information.
ANSWER: cracker
A password ______ is a service that stores all of your account information securely.
ANSWER: manager
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by
taking advantage of another person.
ANSWER: engineering
A session cookie stores user names and/or passwords so that users do not need to enter this
information every time they sign in to the website.
ANSWER: False
A(n) ______ backup copies only the files that have changed since the last full backup.
ANSWER: differential
Software used to fight cybercriminals is called crimeware.
ANSWER: False
Encryption is one safeguard against information theft.
ANSWER: True
PIN stands for personal identification ______.
ANSWER: number
Another term for botnet is ______ army.
ANSWER: zombie
Intentionally erasing software is not an example of software theft.
ANSWER: False
If your computer's operating system provides a personal firewall, you do not need to disable it if you are
using a third-party firewall.
ANSWER: False
A hand geometry system measures the size and shape of a person's hand.
ANSWER: True
You should disable GPS tracking on your mobile device unless you need to use it.
ANSWER: True
Two users can have the same email address.
ANSWER: False
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain
action.
ANSWER: lock
The website for CERT/CC provides information about Internet security breaches.
ANSWER: True
A(n) ______ demands payment to stop an attack.
ANSWER: cyberextortionist
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the
recipient of the data uses to decrypt.
ANSWER: key
A rootkit can be a backdoor.
ANSWER: True
What is an audit trail?
ANSWER: A file that records access attempts
You want to ensure your wireless network is secure. Which of the following should you NOT do?
ANSWER: Broadcast the SSID
An organization creates a disaster recovery plan. Which part would include return procedures (who can
enter the facility, and what actions they are to perform)?
ANSWER: emergency plan
Which of the following is NOT true about CAPTCHAs?
ANSWER: CAPTCHAs were developed to verify input is coming from computer programs, not humans.
Which of the following is NOT true about two-step verification?
ANSWER: When a system sends an authentication code, it typically does not expire.
You realize your computer has been infected with malware. It seems as if someone is controlling your
computer from a remote location. What type of malware might you have?
ANSWER: rootkit
Badges, cards, smart cards, and keys are examples of _____ objects.
ANSWER: possessed
Common digital security risks include information theft and system failure.
ANSWER: True
Which of the following best describes a back door?
ANSWER: A program or set of instructions that allows user to bypass security controls when accessing a
program, computer, or network.
If the web address of a website begins with https instead of http, what do you know about the website?
ANSWER: It is secure.
Content filtering is the process of restricting access to certain material.
ANSWER: True
A password ______ is a service that stores all of your account information securely.
ANSWER: manager
You realize your computer has been infected with malware. The program has been copying itself
repeatedly, using up resources. What type of malware might you have?
ANSWER: worm
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
ANSWER: always stay connected to the Internet
An iris recognition system uses technology to read patterns in the user's ______.
ANSWER: eye
What should an AUP specify?
ANSWER: The acceptable use of technology by employees for personal reasons.
A session cookie stores user names and/or passwords so that users do not need to enter this information
every time they sign in to the website.
ANSWER: False
Which of the following is NOT a recommended practice for gaming safety?
ANSWER: Look for games that use ActiveX or JavaScript, as these are always safe.
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or
allowed/not allowed.
ANSWER: code of conduct
An encryption ______ is a set of steps that converts readable text into unreadable text.
ANSWER: encryption