Name:

 

 

 

Chapter 6. Network and Internet Security and Privacy

 

Homework --- 2 Points Test Extra Credit,††††† Must get 70% correct

 

Question

 

1. TF : A computer worm does not infect other computer files on the infected computer to replicate itself; it spreads by creating copies of its code and sending those copies to other computers via a network.

 

2. TF : A hard drive that uses STP is often referred to as a self-encrypting hard drive.

 

3. TF : A UPS typically provides enough power for a user to save open documents and shut down a computer properly if the power goes out.

 

4. TF : Cybercrime includes any illegal act involving a computer.

 

5. T F : Digital certificates are granted to a user by the ISP that hosts the userís account.

 

6. MC: ____ encryption is also called symmetric encryption.
A . Public key
B . Private key
C . Handshaking
D . none of the above

 

7. MC: ____ is a generic term that refers to any type of malicious software.
A . Malware
B . Trojan horse
C . Virus
D . Dot con

 

8. MC: ____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information.
A . Spamming
B . Pharming
C . Barnstorming
D . Phishing

 

9. MC: ____ occurs when someone obtains enough information about a person to be able to masquerade as that person.
A . Spoofing
B . Pharming
C . Identity theft
D . Data theft

 

10. MC: ____ technology is the ability of one computing device on a network to identify another device on the same network and determine its status.
A . Presence
B . VPN
C . Tunneling
D . GPS triangulating

 

11. MC: A ____ is a type of malware that masquerades as something else.
A . switchbot
B . zombie
C . Trojan horse
D . worm

 

12. MC: A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be.
A . phished
B . spear phished
C . spoofed
D . sponged

 

13. MC: A fingerprint reader is an example of a(n) ____ security feature.
A . holistic
B . biometric
C . ephemeral
D . trivial

 

14. MC: A(n) ____ creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
A . botnet
B . firewall
C . bandwall
D . IP sync

 

15. MC: A(n) ____ is used when a continuous secure channel over the Internet is needed.
A . FDE
B . data stream
C . VoIP
D . VPN

 

16. MC: Buying a product on eBay and then never receiving it is an example of ____.
A . hacking
B . online auction fraud
C . auction pharming
D . war driving

 

17. MC: DDoS attacks are typically carried out by ____.
A . viruses
B . botnets
C . cadres of criminal gangs
D . rival corporations

 

18. MC: Hacking most often occurs ____.
A . in rural parts of the United States
B . when an attacker has physical access to a vulnerable computer
C . over the Internet or another network
D . on college campuses

 

19. MC: Repeated harassment carried out online between adults is referred to as ____.
A . cyberbullying
B . cyberstalking
C . a flame war
D . cyberterrorism

 

20. MC: The ____ Act implements regulations for unsolicited email messages.
A . USA PATRIOT
B . Sarbanes-Oxley
C . Computer Fraud and Abuse
D . none of the above