Chapter 6. Network and Internet Security and Privacy


Homework --- 2 Points Test Extra Credit,††††† Must get 70% correct




1. TF : A computer worm does not infect other computer files on the infected computer to replicate itself; it spreads by creating copies of its code and sending those copies to other computers via a network.


2. TF : A hard drive that uses STP is often referred to as a self-encrypting hard drive.


3. TF : A UPS typically provides enough power for a user to save open documents and shut down a computer properly if the power goes out.


4. TF : Cybercrime includes any illegal act involving a computer.


5. T F : Digital certificates are granted to a user by the ISP that hosts the userís account.


6. MC: ____ encryption is also called symmetric encryption.
A . Public key
B . Private key
C . Handshaking
D . none of the above


7. MC: ____ is a generic term that refers to any type of malicious software.
A . Malware
B . Trojan horse
C . Virus
D . Dot con


8. MC: ____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information.
A . Spamming
B . Pharming
C . Barnstorming
D . Phishing


9. MC: ____ occurs when someone obtains enough information about a person to be able to masquerade as that person.
A . Spoofing
B . Pharming
C . Identity theft
D . Data theft


10. MC: ____ technology is the ability of one computing device on a network to identify another device on the same network and determine its status.
A . Presence
C . Tunneling
D . GPS triangulating


11. MC: A ____ is a type of malware that masquerades as something else.
A . switchbot
B . zombie
C . Trojan horse
D . worm


12. MC: A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be.
A . phished
B . spear phished
C . spoofed
D . sponged


13. MC: A fingerprint reader is an example of a(n) ____ security feature.
A . holistic
B . biometric
C . ephemeral
D . trivial


14. MC: A(n) ____ creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
A . botnet
B . firewall
C . bandwall
D . IP sync


15. MC: A(n) ____ is used when a continuous secure channel over the Internet is needed.
B . data stream
C . VoIP


16. MC: Buying a product on eBay and then never receiving it is an example of ____.
A . hacking
B . online auction fraud
C . auction pharming
D . war driving


17. MC: DDoS attacks are typically carried out by ____.
A . viruses
B . botnets
C . cadres of criminal gangs
D . rival corporations


18. MC: Hacking most often occurs ____.
A . in rural parts of the United States
B . when an attacker has physical access to a vulnerable computer
C . over the Internet or another network
D . on college campuses


19. MC: Repeated harassment carried out online between adults is referred to as ____.
A . cyberbullying
B . cyberstalking
C . a flame war
D . cyberterrorism


20. MC: The ____ Act implements regulations for unsolicited email messages.
B . Sarbanes-Oxley
C . Computer Fraud and Abuse
D . none of the above