1,235
27
Essay, 8 pages (2000 words)

Mis chapter 5. computer, hardware and software safeguard, captcha

cookieWhich of the following terms is used to describe a small text file that a web server stores on your computer? A keygen distributes user names and passwords to those who register their legally purchased copies of a software program. Which of the following statements is not true about software theft? license software for individual useWhat is an EULA intended to do? Information kept on an organization’s premises has a higher security risk than information transmitted over networks. Which of the following statements is not true about Internet and network attacks? VPNWhich of the following provides the mobile user with a secure connection to the company network server? gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of usersSocial engineering, as it pertains to computers, is _____________. Caesar CipherWhich of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions? TrueT/F Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer. TrueT/F Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined. TrueT/F Any device that connects to the Internet is susceptible to mobile malware. botWhat is the term for a program that performs a repetitive task on a network? FalseT/F Proximity sharing gives websites access to your current location. AdobeWhich of the following is not a security product developer? content filteringWhich of the following is the process of restricting access to certain material on the web? content filteringMany businesses use which of the following to limit employees’ web access? The term fair use refers to the rights which creators are entitled for their work. Which of the following statements is not true about intellectual property rights? information theftWhen a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. FalseT/F Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once. TrueT/F Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer. authoring ActiveX scriptsA perpetrator is using a botnet. Which of the following is the least likely use of his botnet? digital forensicsWhat term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? TrueT/F If you are nervous, a signature might not match the one on file in a signature verification systemoutline computer activities for which the computer and network may or may not be usedWhat is an AUP intended to do? With a selective backup, all of the files in the computer automatically are chosen to be copied. Which of the following statements is not true about backing up? TrueT/F Secure sites typically use digital certificates along with security protocols. TrueT/F Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data. VPNWhich of the following provides the mobile user with a secure connection to the company network server? IPWhich of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? TrueT/F A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like. TrueT/F Many Internet security programs include a firewall, antivirus program, and filtering capabilities combinedCAPTCHAYou have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology? MacrosWhich of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly? USBInto which of the following kinds of ports do external fingerprint readers plug? full backupWhich of the following copies all of the files in a computer? FalseT/F The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies. Clear your history file when you are finished browsing. In order to safeguard your personal information, which of the following is recommended? zombiea computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsiderElectronic Communication Privacy ActWhich law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public? voice verification systemWhich of the following does your financial service institution use to secure the transactions you make using their phone banking service? TrueT/F As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. spoofingWhich of the following is the least likely motive for a DDoS? they restore the filesIn the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? FalseT/F Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure. FalseT/F Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal. TrueT/F Secure sites typically use digital certificates along with security protocols. TrueT/F Online shopping sites generally use a session cookie to keep track of items in a user’s shopping cart as shown in the accompanying figure. TrueT/F Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights. signature verification systemWhich of the following does your financial institution use to reduce fraud? secure siteWhat is the term for a website that uses encryption techniques to protect its data? TrueT/F The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected. substitutionIn your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? CERT/CCWhich of the following is a federally funded Internet security research and development center? copyrightWhich of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials? off-siteWhich of the following terms means in a location separate from the computer site? certificate authorityWhich of the following is an authorized person or company that issues and verifies digital certificates25One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? A zombie army is used to attack computers or computer networks. What happens during a DDoS attack? TrueT/F To remove spyware, users need to obtain a special program that can detect and delete ithand geometry systemWhich of the following does your company use to track your time and attendance? backing upWhich of the following terms refers to making a copy of a file? IT code of conductWhich of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? digital security riskWhich of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? asymmetric key encriptionWhat is another name for public key encryption? networkWhich kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously? an encryption algorithmWhich of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? script kiddieWhich of the following has the same intent as a cracker, but does not have the technical skills and knowledge? grandfatheroldest copy of the fileiris recognition systemWhich of the following does a new federal laboratory use in its high security areas? employee monitoringWhich of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited? information privacyWhich of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them? spoofingWhich of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? botneta group of compromised computers connected to a network that attacks other networks2 yearsHow long can digital certificates be valid? malwareComputer viruses, worms, Trojan horses, and rootkits are classified as which of the following? voice verification systemWhich of the following does your financial service institution use to secure the transactions you make using their phone banking service? siteWhich kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount? ethicalAn IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? Biometric devices are an unreliable method of identification and notification. Which of the following statements is not true about biometric devices? crackerWhich of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? compactionIn your encryption algorithm, you removed every third letter. Which algorithm did you use? crimewareWhich term is used to describe software used by cybercriminals? biometricA(n) ____________________ device authenticates a person’s identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. Back doorA(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. code of conductEmployers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and studentsDosA(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email. encryption____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access. piracy____________________ is the unauthorized and illegal duplication of copyrighted software. online security servicea(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities. possessedA(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility. EULAThe most common type of license included with software purchased by individual users is a(n) ____________________. licenseA(n) ____________________ agreement is the right to use software. accessA(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer. session cookieWebsites use which of the following to keep track of items in a user’s shopping cart? selective backupWith which of the following do users choose which folders and files to include in a backup? spywareInternet advertising firms often use which of the following to collect information about users web browsing habits? expansionWhich encryption algorithm inserts characters between existing characters? decryptionTo read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? distributedIn which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks? less than $100How much do fingerprint readers typically cost? energy starPersonal computers, display devices, and printers should comply with guidelines of which of the following programs? SSIDA wireless network should be configured so that it does not broadcast a network name, known as a(n) ___. three-generation backupSome users implement a(n) ___ policy to preserve three copies of important files. compactionA(n) ___ encryption algorithm removes characters and stores them elsewhere. secureWeb address of ___ sites often begin with https instead of http. CiphertextIn the encryption process, the encrypted (scrambled) data is called ___. payloadThe ___ is the destructive even or prank malware is intended to deliverlow audio qualityWhich of the following is NOT a symptom of a computer or mobile device functioning as a zombie? hand geometry systemWhich of the following does your college use to verify your identity? keygenWhich of the following can be used to create a software registration number, sometimes illegally? digital signatureWhich of the following terms is used to describe an encrypted code that a person, Web site, or organization uses to verify the identity of the message sender? TrueT/F FOIA enables public access to most government records. FalseT/F The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies. FalseT/F COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries. FalseT/F Programmers often build trapdoors into programs during system development. product activationYou have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process? UPSWhich of the following statements is not a safeguard against the failure of hardware? TrueT/F HIPAA protects individuals against the wrongful disclosure of their health information. TrueT/F The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure. TrueT/F Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network. FalseT/F Proximity sharing gives websites access to your current location.

Thank's for Your Vote!
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 1
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 2
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 3
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 4
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 5
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 6
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 7
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 8
Mis chapter 5. computer, hardware and software safeguard, captcha. Page 9

This work, titled "Mis chapter 5. computer, hardware and software safeguard, captcha" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Mis chapter 5. computer, hardware and software safeguard, captcha'. 2 October.

Reference

AssignBuster. (2022, October 2). Mis chapter 5. computer, hardware and software safeguard, captcha. Retrieved from https://assignbuster.com/mis-chapter-5-computer-hardware-and-software-safeguard-captcha/

References

AssignBuster. 2022. "Mis chapter 5. computer, hardware and software safeguard, captcha." October 2, 2022. https://assignbuster.com/mis-chapter-5-computer-hardware-and-software-safeguard-captcha/.

1. AssignBuster. "Mis chapter 5. computer, hardware and software safeguard, captcha." October 2, 2022. https://assignbuster.com/mis-chapter-5-computer-hardware-and-software-safeguard-captcha/.


Bibliography


AssignBuster. "Mis chapter 5. computer, hardware and software safeguard, captcha." October 2, 2022. https://assignbuster.com/mis-chapter-5-computer-hardware-and-software-safeguard-captcha/.

Work Cited

"Mis chapter 5. computer, hardware and software safeguard, captcha." AssignBuster, 2 Oct. 2022, assignbuster.com/mis-chapter-5-computer-hardware-and-software-safeguard-captcha/.

Get in Touch

Please, let us know if you have any ideas on improving Mis chapter 5. computer, hardware and software safeguard, captcha, or our service. We will be happy to hear what you think: [email protected]