• No results found

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

N/A
N/A
Protected

Academic year: 2022

Share "10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside

2- A (system failure) is the prolonged malfunction of a computer

3- A (worm) is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network

4-A (VPN) provides the mobile user with a secure connection to the company network server 5- (Audit control) software monitors and records computer activity

6- A computer (security risk) is an event, action, or situation that can lead to the loss or destruction of computer systems or their data

7- An internet (denial of service) attack occurs when an internet server is purposely overloaded so that it cannot process legitimate transmissions

8- A (uninterruptible power supply) can protect computers from data loss during power failures 9- A (worm) is a program that does NOT have to be executed in order to propagate over a network 10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

11- A (surge protector) shield electronic equipment from power spikes

12- A computer (virus) is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission 13- A person breaking into a computer laboratory and smashing computers is an example of (hardware vandalism)

14- A destructive program that remains on a computer system until the occurrence of special event or time is called a (Time bomb)

15- A (surge protector) uses special electrical components to provide a stable current flow to the computer and other electronic equipment

16- (Antivirus programs) are designed to search for viruses, notify users when they’re found, and remove them from infected disks or files

17- A (digital signature) is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity the sender

18- A (cracker) is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action

(2)

19- A (Trojan horse) is a malicious – logic program that hides within or looks a legitimate program and usually is triggered by a certain condition or action

20- A (cyber terrorist) is someone who uses the internet to destroy or damage computers for political reasons

21- Another name for a time bomb is a (logic) bomb

22- A (rootkit) is a program that hides in a computer and allows someone from a remote location to take full control of the computer

23- A (uninterruptible power supply) is a battery-powers piece of equipment that provides backup power to a computer for a limited time

24- A (cyberextortionist) is someone who uses e-mail as a vehicle for extortion 25- Breaking into other computer system is called (Electronic trespassing)

26- (Corporate spies) are hired to break into a specific computer and steal its proprietary data 27- Crimes that use the internet are called (cybercrimes)

28- Code hidden within a program that damages or destroys files is called a computer (virus) 29- (Denial of service (dos)) attacks bombard servers and web sites with traffic that shuts down networks

30- (Employee monitoring) allows an employer to observe employee phone calls, e-mails, and Web browsing

31-(encryption) is the process of converting readable data into unreadable characters to prevent unauthorized access

32- Firewalls are used to (restrict outsiders from accessing internal data)

33- (Information theft) occurs when someone steals personal or confidential information

34- In which type of attack does the attacker poses as a legitimate company in an e-mail or website (phishing)

35- Malicious software is known as (malware)

36- Many web sites require a user to enter a (username), which is a unique combination of characters, such as letters of alphabet or numbers that identifies one specific user

37- of the currently employed access control methods, (biometric authentication) is the most secure, because it involves identification of the user’s body, such as his or her eyes or fingerprints

(3)

38- (Spoofing) is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

39- (Spyware) is technology that collects information from computer users without their knowledge or consent

40- (Software theft) occurs when someone steals software media, intestinally erase programs, or illegally copies a program

41- The scrambling of code is known as (encryption) 42- The term malware is short for (malicious software)

43-The ability to convey a message without disclosing your name or identity is known as (anonymity) 44- To safeguard your equipment and data against power-related issues, you should always use a (surge protector)

45-This type of software collects your personal information, monitors your web surfing habits and distributes this information to a third party (spyware)

46-The ability to convey a message without disclosing your name or identity is known as (anonymity) 47- Using a technique known as (IP spoofing) a message is sent to a computer system using an IP address disguised as one from a trusted source

48- (Unethical employees) break into their employer’s computers for a variety of reasons to exploit a security weakness, to seek financial gain from selling confidential information, on to take revenge 49- What do you call a piece of code that attaches to an applications program and secretly spreads when the application program is executes (Virus)

50- What do you call a program that secretly records information about a computer user’s activities and sends it out over the internet (Spybot)

51- What do you call a person who access a computer without authorization (Hacker)

52- What do you call a program that perform a useful task while at the same time carrying out some secret destructive act (Trojan horse)

53- What is the best definition of a computer hacker (A hacker is a person who investigates a computer system to understand both its full capabilities and vulnerabilities)

54- What do you call a program that has the ability to execute independently and spread over a computer network? (Worm)

55- Which of the following best describes web bug (a component of a web page that tracks and collects information about visitors)

(4)

56- What is the study of converting information into encoded or scrambled formats called (Cryptography)

57- Which type of rogue program is disguised as a useful program but contains hidden instructions to perform a malicious task (Trojan horse)

58- Which of the following best describes a web bug (A component of a web page that tracks and collects information about visitors)

59- Which of the following passwords provides the most secure choice (3R2Wvx8@)

60- What is the best definition of a cookie (It is a plain-text file written to your hard disk by a web site you visit)

61- Which of the following groups of people present the greatest threat to a company’s information structure (Company insiders)

62- Which of the following is true of cookies (They help companies track browsing habits and preferences of users)

63- Which of the following NOT a technique you can effectively use to reduce the amount of unauthorized email on your computer (Reply to spam and ask to be removed from the mailing list) 64- A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge

(5)

1- A DOS attack is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (×)

2- A message that has been coded with an encryption key is referred to as encrypto – text (×) 3- A digital signature guarantees that a message has not been tampered with (√)

4- A cyberextortionist is someone who uses the internet or a network to destroy or damage computers (×)

5- All new cell phones have GPS awareness (√)

6- Before it is encrypted, a readable message is known as ciphertext (×) 7- Computer forensics is a form of computer crime (×)

8- Computer crime often goes unreported because businesses fear negative publicity (√)

9- In general, computer viruses don’t discriminate among operating systems; a typical virus can infect any system, regardless of platform

(×)

10- Information can be recovered from a hard drive even after file have been deleted

(√)

11- IP spoofing takes place when hacker sends a message with an IP address disguised as an incoming message

(√)

12- Malware includes spyware, computer viruses and various rogue programs

(√)

13- Organized crime and terrorist organizations aren’t likely to commit computer crimes because they don’t have the expertise

(×)

14- Private Key encryption is considered essential for e-commerce

(×)

15- Personal firewalls are programs of devices that protect home computers from unauthorized access

(√)

16-Privacy and computer crime are the same

(×)

17- Security procedures eliminate all risks to computers

(√)

18- Smart cards and biometrics are two ways companies may add physical security to computer systems

(√)

18- Spam is a program placed on a computer without the user

(×)

19- Stealing the key used for encryption is called key intermediation (×)

(6)

20- The next major war will probably involve some kind of cyber-attacks

(√)

21- The majority of computer crimes are committed by hackers and vandals with no ties to the victim companies (×)

22- The most widely used data recovery technique is making regular backups

(√)

23- Wireless access poses additional security risks

(√)

24- When you browse from site to site, the cookie that has been loaded onto the computer’s hard drive is not detected, read and matched with previous browsing activity

(×)

References

Related documents

As the Extended Enterprise is no single legal entity, and companies really want to realize a loose coupling between their systems (via XML Web services for

In order for the transfer to occur, the City of Las Vegas and the State of Nevada agreed to prepare a master plan for the Park that ensures that Floyd Lamb Park and the

Single scale model-based obstacle detection framework presents a viable basis for im- plementing complete embedded obstacle detection systems, depending on the environment

spanning tree from RAPD data. RAPD profiles of some Portuguese L. RAPD band patterns within L.. Phylogenetic trees of the L. donovani complex based on RAPD data. donovani

The PIOH -g- PLA copolymer is comprised of grafted PLA with hydroxyl group at one end, in addition to remaining hydroxylated polyisoprene backbone, further increases the amount

The VBN method gives the contribution of the given node to the different types of front end faults for every node in the graph (representing e.g.

A fuzzy set preference model has successfully measured the students’ perceptions in form of degree of memberships and perhaps could be used as meaningful input specifically in a

As part of the study, the impact of individual forms of technology transfer (material and non-material technology transfer, open sources of innovation, cooperation for