Term
An iris recognition system uses technology to read patterns in the user's ______. |
|
Definition
|
|
Term
A(n) ______ has a goal of destroying data or stealing information. |
|
Definition
|
|
Term
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
|
|
|
Definition
|
|
Term
|
|
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
|
|
|
Definition
|
|
Term
Which of the following is NOT true about CAPTCHAs? |
|
Definition
CAPTCHAs were developed to verify input is coming from computer programs, not humans |
|
|
Term
Which of the following is not recommended to protect against hardware failure? |
|
Definition
|
|
Term
Two users can have the same email address. |
|
Definition
|
|
Term
A hand geometry system measures the size and shape of a person's hand. |
|
Definition
|
|
Term
If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall |
|
Definition
|
|
Term
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning |
|
Definition
|
|
Term
Viruses, worms, and trojan horses replicate themselves to other computers or devices. |
|
Definition
|
|
Term
To protect files on your device's hard drive from hackers, turn on file and printer sharing.
|
|
|
Definition
|
|
Term
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person |
|
Definition
|
|
Term
An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)? |
|
Definition
|
|
Term
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications |
|
Definition
|
|
Term
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack. |
|
Definition
|
|
Term
Another term for botnet is ______ army. |
|
Definition
|
|
Term
A rootkit can be a backdoor. |
|
Definition
|
|
Term
You want to ensure your wireless network is secure. Which of the following should you NOT do? |
|
Definition
|
|
Term
The website for CERT/CC provides information about Internet security breaches. |
|
Definition
|
|
Term
Piracy is the most common form of software theft. |
|
Definition
|
|
Term
A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website |
|
Definition
|
|
Term
A password ______ is a service that stores all of your account information securely.
|
|
|
Definition
|
|
Term
A(n) ______ was originally a complimentary work for a computer enthusiast |
|
Definition
|
|
Term
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have? |
|
Definition
|
|
Term
Malware is short for ______ software |
|
Definition
|
|
Term
Common digital security risks include information theft and system failure. |
|
Definition
|
|
Term
Which of the following best describes a single sign on account? |
|
Definition
When you enter your name into one account and you are automatically signed into other accounts and services. |
|
|
Term
|
|
Employers can use firewalls to restrict employees' access to sensitive data
|
|
|
|
|
Definition
|
|
Term
You should disable GPS tracking on your mobile device unless you need to use it. |
|
Definition
|
|
Term
A(n) ______ demands payment to stop an attack. |
|
Definition
|
|
Term
|
Definition
A file that records access attempts |
|
|
Term
Which of the following is NOT a recommended practice for gaming safety? |
|
Definition
Which of the following is NOT a recommended practice for gaming safety? |
|
|
Term
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
Which of the following is NOT true about cloud data privacy? |
|
Definition
Law enforcement officials cannot access email messages stored on the cloud without informing the user first. |
|
|
Term
Badges, cards, smart cards, and keys are examples of _____ objects. |
|
Definition
|
|
Term
A(n) ______ backup copies only the files that have changed since the last full backup. |
|
Definition
|
|
Term
Which of the following is not a green computing recommendation? |
|
Definition
Purchase low-efficiency equipment. |
|
|
Term
|
Definition
Creates software registration numbers. |
|
|
Term
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______. |
|
Definition
students' educational records |
|
|
Term
PIN stands for personal identification ______. |
|
Definition
|
|
Term
Which of the following is NOT a part of a typical single-user license agreement? |
|
Definition
You can rent or lease the software. |
|
|
Term
Intentionally erasing software is not an example of software theft
|
|
|
Definition
|
|
Term
Security experts recommend using different user names and passwords for every account. |
|
Definition
|
|
Term
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have? |
|
Definition
|
|
Term
With CDP, all data is backed up whenever a change is made. |
|
Definition
|
|
Term
Which of the following is NOT true about two-step verification? |
|
Definition
When a system sends an authentication code, it typically does not expire. |
|
|
Term
A(n) ______ often uses prewritten hacking and cracking programs. |
|
Definition
|
|
Term
Passcode is another term for a(n) ______. |
|
Definition
|
|
Term
What should an AUP specify? |
|
Definition
The acceptable use of technology by employees for personal reasons. |
|
|