BCIS 2610 FINAL EXAM QUESTIONS & ANSWERS
Computer crime is sometimes referred to as - Answers -cybercrime
To explain acceptable computer use to their employees, students, or other users, many
organizations and educational institutions publish guidelines for behavior, often called -
Answers -codes of conduct
_______ refers to the act of breaking into a computer or network - Answers -hacking
According to a recent study, the total cost per data breach in _______ is $5.4 million----
the highest of any country. - Answers -the United States
Advocates of ______ state that, unless individuals or businesses protect their access
points, they are welcoming others to use them - Answers -war driving
The term ______ refers to accessing someone else's unsecured Wi-Fi network from the
hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot
location, or near a local business) - Answers -Wi-Fi piggybacking
_________, the most commonly used type of possessed knowledge, are secret words
or character combinations associated with an individual - Answers -passwords
_________ access systems use physical objects for this identification purposes and
they are frequently used to control access to facilities and computer systems - Answers
-possessed object
Increasingly, USB security keys, also called USB security ________---- USB flash
drives that are inserted into a computer to grant access to a network, to supply Web site
usernames and passwords, or to provide other security features---- are being used -
Answers -tokens
______ identify users by a particular unique biological characteristic - Answers -
biometric access systems
A ________ is a security system that essentially creates a wall between a computer or
network and the Internet in order to protect against unauthorized access - Answers -
firewall
_____ uses a single secret key to both encrypt and decrypt the file or message -
Answers -Asymmetric Key Encryption
Some Web-based encrypted e-mail systems-----such as the popular free ______
service---- require both the sender and recipient to have accounts through that system -
Answers -Hushmail
,A _______ provides a secure private tunnel from the user's computer through the
Internet to another destination and is most often used to provide remote employees with
secure access to a company network - Answers -virtual private network
______ software can control which devices can be connected to an employee's
computer - Answers -Professional firewall
_______ includes any acts of malicious destruction to a computer or computer resource
- Answers -computer sabotage
A computer that is controlled by a hacker or other computer criminal is referred to as a -
Answers -bot
_______ is a generic term that refers to any type of malicious software - Answers -
malware
A computer _____ is a software program that is installed without the permission or
knowledge of the computer user, that is designed to alter the way a computer operates,
and that can replicate itself to infect any new media it has access to - Answers -virus
Like a computer virus, a _______ is a malicious program designed to cause damage -
Answers -computer worm
A _______ is a malicious program that masquerades as something else----usually as
some type of application program - Answers -Trojan horse
A computer _____ spreads by creating copies of its code and sending those copies to
other computers via a network - Answers -worm
One emerging type of Trojan horse is called _____-Access Trojan - Answers -remote
Antivirus programs are usually set up to automatically download new ____ from their
associated Web site on a regular basis - Answers -threat definitions
A booming area of computer crime involves online fraud, theft, scams, and related
activities collectively referred to as - Answers -dot cons
______ occurs when someone obtains enough information about a person to be able to
masquerade as that person for a variety of activities----usually to buy products or
services in that person's name - Answers -identity theft
_______ can be extremely distressing for victims, can take years to straighten out, and
can be very expensive - Answers -identity theft
, Phishing schemes may use a technique called ______, which is setting up spoofed
Web sties with addresses slightly different from legitimate sites - Answers -
typosquatting
______ is a type of scam that uses spoofed domain names to obtain personal
information for use in fraudulent activities - Answers -pharming
the best protection from many dot cons is - Answers -common sense
When a digitally signed document is received, the recipient's computer uses the
sender's ____ key to verify the digital signature - Answers -public
The green color of the Address bar in the accompanying figure indicates that the site is
using a valid ____ SSL certificate - Answers -EV
repeated threats or other harassment carried out online between adults is referred to as
- Answers -cyberstalking
The ______, implemented in 2001, grants federal authorities expanded surveillance and
intelligence-gathering powers, such as broadening their ability to obtain the real identity
of Internet users and to intercept Internet communications - Answers -USA Patriot Act
The ______ includes provisions to combat cyberterrorism, including protecting ISPs
against lawsuits from customers for revealing private information to law enforcement
agencies - Answers -Homeland Security Act of 2002
Our networked society has raised a number of ___ concerns - Answers -privacy
New security risks are revealed all the time. For instance, it was recently discovered
that data from some unencrypted smart meters can be accessed from nearly _____
away, enabling would-be burglars to monitor homes to see if they are occupied based
on electricity usage within the homes. - Answers -1,000 feet
Although many of us may prefer not to think about it, ____---- the complete malfunction
of a computer system---- and other types of computer-related disasters do happen. -
Answers -system failure
To facilitate using a computer lock, nearly all computers today come with a _____----a
small opening built into the system unit case designed for computer locks. - Answers -
security slot
____ can be used to secure portable computers, external hard drives, and other
portable pieces of hardware to a table or other object. - Answers -Cable locks
Computer crime is sometimes referred to as - Answers -cybercrime
To explain acceptable computer use to their employees, students, or other users, many
organizations and educational institutions publish guidelines for behavior, often called -
Answers -codes of conduct
_______ refers to the act of breaking into a computer or network - Answers -hacking
According to a recent study, the total cost per data breach in _______ is $5.4 million----
the highest of any country. - Answers -the United States
Advocates of ______ state that, unless individuals or businesses protect their access
points, they are welcoming others to use them - Answers -war driving
The term ______ refers to accessing someone else's unsecured Wi-Fi network from the
hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot
location, or near a local business) - Answers -Wi-Fi piggybacking
_________, the most commonly used type of possessed knowledge, are secret words
or character combinations associated with an individual - Answers -passwords
_________ access systems use physical objects for this identification purposes and
they are frequently used to control access to facilities and computer systems - Answers
-possessed object
Increasingly, USB security keys, also called USB security ________---- USB flash
drives that are inserted into a computer to grant access to a network, to supply Web site
usernames and passwords, or to provide other security features---- are being used -
Answers -tokens
______ identify users by a particular unique biological characteristic - Answers -
biometric access systems
A ________ is a security system that essentially creates a wall between a computer or
network and the Internet in order to protect against unauthorized access - Answers -
firewall
_____ uses a single secret key to both encrypt and decrypt the file or message -
Answers -Asymmetric Key Encryption
Some Web-based encrypted e-mail systems-----such as the popular free ______
service---- require both the sender and recipient to have accounts through that system -
Answers -Hushmail
,A _______ provides a secure private tunnel from the user's computer through the
Internet to another destination and is most often used to provide remote employees with
secure access to a company network - Answers -virtual private network
______ software can control which devices can be connected to an employee's
computer - Answers -Professional firewall
_______ includes any acts of malicious destruction to a computer or computer resource
- Answers -computer sabotage
A computer that is controlled by a hacker or other computer criminal is referred to as a -
Answers -bot
_______ is a generic term that refers to any type of malicious software - Answers -
malware
A computer _____ is a software program that is installed without the permission or
knowledge of the computer user, that is designed to alter the way a computer operates,
and that can replicate itself to infect any new media it has access to - Answers -virus
Like a computer virus, a _______ is a malicious program designed to cause damage -
Answers -computer worm
A _______ is a malicious program that masquerades as something else----usually as
some type of application program - Answers -Trojan horse
A computer _____ spreads by creating copies of its code and sending those copies to
other computers via a network - Answers -worm
One emerging type of Trojan horse is called _____-Access Trojan - Answers -remote
Antivirus programs are usually set up to automatically download new ____ from their
associated Web site on a regular basis - Answers -threat definitions
A booming area of computer crime involves online fraud, theft, scams, and related
activities collectively referred to as - Answers -dot cons
______ occurs when someone obtains enough information about a person to be able to
masquerade as that person for a variety of activities----usually to buy products or
services in that person's name - Answers -identity theft
_______ can be extremely distressing for victims, can take years to straighten out, and
can be very expensive - Answers -identity theft
, Phishing schemes may use a technique called ______, which is setting up spoofed
Web sties with addresses slightly different from legitimate sites - Answers -
typosquatting
______ is a type of scam that uses spoofed domain names to obtain personal
information for use in fraudulent activities - Answers -pharming
the best protection from many dot cons is - Answers -common sense
When a digitally signed document is received, the recipient's computer uses the
sender's ____ key to verify the digital signature - Answers -public
The green color of the Address bar in the accompanying figure indicates that the site is
using a valid ____ SSL certificate - Answers -EV
repeated threats or other harassment carried out online between adults is referred to as
- Answers -cyberstalking
The ______, implemented in 2001, grants federal authorities expanded surveillance and
intelligence-gathering powers, such as broadening their ability to obtain the real identity
of Internet users and to intercept Internet communications - Answers -USA Patriot Act
The ______ includes provisions to combat cyberterrorism, including protecting ISPs
against lawsuits from customers for revealing private information to law enforcement
agencies - Answers -Homeland Security Act of 2002
Our networked society has raised a number of ___ concerns - Answers -privacy
New security risks are revealed all the time. For instance, it was recently discovered
that data from some unencrypted smart meters can be accessed from nearly _____
away, enabling would-be burglars to monitor homes to see if they are occupied based
on electricity usage within the homes. - Answers -1,000 feet
Although many of us may prefer not to think about it, ____---- the complete malfunction
of a computer system---- and other types of computer-related disasters do happen. -
Answers -system failure
To facilitate using a computer lock, nearly all computers today come with a _____----a
small opening built into the system unit case designed for computer locks. - Answers -
security slot
____ can be used to secure portable computers, external hard drives, and other
portable pieces of hardware to a table or other object. - Answers -Cable locks