Shared Flashcard Set

Details

Module 5
Discovering Computers 2018
49
Computer Science
Undergraduate 1
10/03/2018

Additional Computer Science Flashcards

 


 

Cards

Term
An iris recognition system uses technology to read patterns in the user's ______.
Definition
eye
Term
 A(n) ______ has a goal of destroying data or stealing information.
Definition
cracker
Term

 

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
Definition
lock
Term

 

 
 
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
Definition
false
Term
Which of the following is NOT true about CAPTCHAs?
Definition
CAPTCHAs were developed to verify input is coming from computer programs, not humans
Term
Which of the following is not recommended to protect against hardware failure?
Definition
cables and locks
Term
Two users can have the same email address.
Definition
false
Term
A hand geometry system measures the size and shape of a person's hand.
Definition
true
Term
If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall
Definition
false
Term
Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning
Definition
true
Term
Viruses, worms, and trojan horses replicate themselves to other computers or devices.
Definition
false
Term

 

To protect files on your device's hard drive from hackers, turn on file and printer sharing.
Definition
false
Term
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person
Definition
engineering
Term
An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?
Definition
emergency plan
Term

You recently purchased a new laptop for home. You want to ensure that you are safe from malware.

 

You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications
Definition
firewall
Term
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
Definition
distributed
Term
Another term for botnet is ______ army.
Definition
zombie
Term
A rootkit can be a backdoor.
Definition
true
Term
You want to ensure your wireless network is secure. Which of the following should you NOT do?
Definition
Broadcast the SSID.
Term
The website for CERT/CC provides information about Internet security breaches.
Definition
true
Term
Piracy is the most common form of software theft.
Definition
true
Term
A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website
Definition
false
Term

 

A password ______ is a service that stores all of your account information securely.
Definition
manager
Term
 A(n) ______ was originally a complimentary work for a computer enthusiast
Definition
hacker
Term
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
Definition
worm
Term
Malware is short for ______ software
Definition
malicious
Term
Common digital security risks include information theft and system failure.
Definition
true
Term
Which of the following best describes a single sign on account?
Definition
When you enter your name into one account and you are automatically signed into other accounts and services.
Term

 

 
 
Employers can use firewalls to restrict employees' access to sensitive data
 
 
Definition
true
Term
You should disable GPS tracking on your mobile device unless you need to use it.
Definition
true
Term
A(n) ______ demands payment to stop an attack.
Definition
cyberextortionist
Term
What is an audit trail?
Definition
A file that records access attempts
Term
Which of the following is NOT a recommended practice for gaming safety?
Definition
Which of the following is NOT a recommended practice for gaming safety?
Term

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.

 

Which of the following is NOT true about cloud data privacy?
Definition
Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
Term
Badges, cards, smart cards, and keys are examples of _____ objects.
Definition
posessed
Term
A(n) ______ backup copies only the files that have changed since the last full backup.
Definition
differential
Term
Which of the following is not a green computing recommendation?
Definition
Purchase low-efficiency equipment.
Term
What does a keygen do?
Definition
Creates software registration numbers.
Term

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.

 

FERPA regulates the confidentiality of ______.
Definition
students' educational records
Term
PIN stands for personal identification ______.
Definition
number
Term
Which of the following is NOT a part of a typical single-user license agreement?
Definition
You can rent or lease the software.
Term

 

Intentionally erasing software is not an example of software theft
Definition
false
Term
Security experts recommend using different user names and passwords for every account.
Definition
true
Term
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
Definition
rootkit
Term
With CDP, all data is backed up whenever a change is made.
Definition
true
Term
Which of the following is NOT true about two-step verification?
Definition
When a system sends an authentication code, it typically does not expire.
Term
A(n) ______ often uses prewritten hacking and cracking programs.
Definition
script kiddie

 

Term
Passcode is another term for a(n) ______.
Definition
PIN
Term
What should an AUP specify?
Definition

 

The acceptable use of technology by employees for personal reasons.
Supporting users have an ad free experience!