Test Bank for New Perspectives on Computer Concepts 2018:
Comprehensive, 20th Edition, June Jamrich Parsons
To download the complete and accurate content document, go to: https://testbankbell.com/download/test-bank-for-new-perspectives-on-computer-conc epts-2018-comprehensive-20th-edition-june-jamrich-parsons/

Name: Class: Date:
Module 07: Digital Security
1. This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
a. Authentication
b. Encryption
c. Ciphertext
d. Decryption
ANSWER: b
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:28 AM
DATE MODIFIED: 8/4/2017 1:29 AM
2. An original message or file that has not yet been encrypted is referred to as ciphertext.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:30 AM
DATE MODIFIED: 8/4/2017 1:31 AM
3. A cryptographic is a word, number, or phrase that must be known to encrypt or decrypt data.
ANSWER: key
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:32 AM
DATE MODIFIED: 8/4/2017 1:32 AM
4. There are various encryption methods, but is the encryption standard currently used worldwide.
a. AES (Advanced Encryption Standard)
b. DDoS (distributed denial of service attacks)
c. IMSI (International Mobile Subscriber Identity)
d. TLS (Transport Layer Security)
ANSWER: a
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
Module 07: Digital Security
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:33 AM
DATE MODIFIED: 8/4/2017 1:34 AM
5. A cryptographic is a procedure for encryption or decryption.
a. firewall
b. ciphertext
c. key
d. algorithm
ANSWER: d
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:36 AM
DATE MODIFIED: 8/4/2017 1:36 AM
6. Which of the following is not an example of user authentication?
a. Password
b. PINs
c. Fingerprint scanner
d. URLs (Uniform Resource Locators)
ANSWER: d
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:37 AM
DATE MODIFIED: 8/4/2017 1:39 AM
7. The single most effective security measure for digital devices is to require a login password.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:39 AM
DATE MODIFIED: 8/4/2017 1:40 AM
8. Passwords used as encryption help to make hijacked data unusable.
ANSWER: keys
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:40 AM
DATE MODIFIED: 8/4/2017 1:41 AM
9. All Android devices automatically encrypt data stored on the device when a user activates the login password.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:41 AM
DATE MODIFIED: 8/7/2017 3:27 AM
10. It is not possible to encrypt a Windows hard drive volume.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:43 AM
DATE MODIFIED: 8/4/2017 1:43 AM
11. FileVault is a MacOS utility included on by default on Macintosh computers that automatically encrypts data stored locally.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:44 AM
DATE MODIFIED: 8/4/2017 1:44 AM
12. A(n) password is difficult to hack.
ANSWER: strong
Copyright Cengage Learning. Powered by Cognero. Page 3
Name: Class: Date:
Module 07: Digital Security
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:45 AM
DATE MODIFIED: 8/4/2017 1:45 AM
13. Conventional wisdom tells us that strong passwords are at least characters in length and include one or more uppercase letters, numbers, and symbols.
ANSWER: eight, 8
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:41 AM
DATE MODIFIED: 8/4/2017 2:42 AM
14. Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?
a. Entropy
b. Massive
c. Dictionary
d. Brute force
ANSWER: d
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:43 AM
DATE MODIFIED: 8/4/2017 2:44 AM
15. Which of the following is not a characteristic of a weak password?
a. Eight characters in length and include one or more uppercase letters, numbers, and symbols
b. Uses default passwords such as password, admin, system, and guest
c. Any sequence that includes a user name
d. Use of a word from a dictionary
ANSWER: a
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:44 AM
DATE MODIFIED: 8/4/2017 2:45 AM
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:
Module 07: Digital Security
16. Brute force attacks methodically try every possible password until the correct one is found.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:47 AM
DATE MODIFIED: 8/4/2017 2:48 AM
17. Password is a measure in bits of a password’s unpredictability.
ANSWER: entropy
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:49 AM
DATE MODIFIED: 8/4/2017 2:49 AM
18. Password entropy is a measure in of a password’s unpredictability.
ANSWER: bits
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:50 AM
DATE MODIFIED: 8/4/2017 2:50 AM
19. If you want to store passwords on a digital device, make sure to the file in which they are stored.
ANSWER: encrypt
POINTS: 1
REFERENCES: STRONG PASSWORDS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:51 AM
DATE MODIFIED: 8/4/2017 2:51 AM
20. If you feel more secure with a totally random and unique password for each of your logins, then a(n) is an excellent option.
a. keylogger
b. encryption key
c. password manager
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
d. personal firewall
ANSWER: c
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:51 AM
DATE MODIFIED: 8/4/2017 2:53 AM
21. The core function of a password manager is to store user IDs with their corresponding ________.
ANSWER: passwords
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:53 AM
DATE MODIFIED: 8/4/2017 2:53 AM
22. Password managers can generate unique passwords that have very good entropy.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:54 AM
DATE MODIFIED: 8/7/2017 3:28 AM
23. Password managers store passwords in a(n) file.
ANSWER: encrypted
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:55 AM
DATE MODIFIED: 8/4/2017 2:56 AM
24. If you use a password manager, what do you as the user need to remember?
a. Your passwords for individual sites
b. The master password
c. Form data including credit card numbers
d. All of the above
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
ANSWER: b
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:56 AM
DATE MODIFIED: 8/4/2017 2:57 AM
25. A password manager can store passwords in an encrypted file located at which of the following storage locations?
a. Local storage
b. Cloud storage
c. USB storage
d. All of the above
ANSWER: d
POINTS: 1
REFERENCES: PASSWORD MANAGERS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:57 AM
DATE MODIFIED: 8/4/2017 2:58 AM
26. refers to any computer program designed to surreptitiously enter a digital device.
ANSWER: Malware
POINTS: 1
REFERENCES: MALWARE THREATS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 2:59 AM
DATE MODIFIED: 8/4/2017 2:59 AM
27. The action carried out by malware code is referred to as a(n)
ANSWER: exploit
POINTS: 1
REFERENCES: MALWARE THREATS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:00 AM
DATE MODIFIED: 8/4/2017 3:00 AM
28. Common classifications of include viruses, worms, and trojans.
ANSWER: malware
POINTS: 1
REFERENCES: MALWARE THREATS
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:01 AM
DATE MODIFIED: 8/4/2017 3:01 AM
29. A computer is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
a. trojan
b. virus
c. worm
d. all of the above
ANSWER: b
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:02 AM
DATE MODIFIED: 8/4/2017 3:03 AM
30. In addition to replicating itself, a virus is self-distributing.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:04 AM
DATE MODIFIED: 8/4/2017 3:05 AM
31. Viruses spread themselves from one device to another.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:05 AM
DATE MODIFIED: 8/4/2017 3:06 AM
32. is the process of modifying an executable file or data stream by adding additional commands.
a. Keylogging
Copyright Cengage Learning. Powered by Cognero. Page
Name: Class: Date:
Module 07: Digital Security
b. Pharming
c. Brute force attack
d. Code injection
ANSWER: d
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:06 AM
DATE MODIFIED: 8/4/2017 3:07 AM
33. What is the process called when an app from a source other than an official app store is installed on a device?
a. Side-loading
b. Rootkit
c. Code injection
d. Dropper
ANSWER: a
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:08 AM
DATE MODIFIED: 8/4/2017 3:09 AM
34. Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
ANSWER: rootkit
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:09 AM
DATE MODIFIED: 8/4/2017 3:10 AM
35. A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: COMPUTER VIRUSES
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:10 AM
DATE MODIFIED: 8/4/2017 3:11 AM
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
36. A computer is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim’s device.
ANSWER: worm
POINTS: 1
REFERENCES: COMPUTER WORMS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:11 AM
DATE MODIFIED: 8/4/2017 3:12 AM
37. Which of the following is not a characteristic of a computer worm?
a. Self-replicating
b. Usually standalone executable programs
c. Self-distributing
d. Spread through a process called side-loading
ANSWER: d
POINTS: 1
REFERENCES: COMPUTER WORMS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:12 AM
DATE MODIFIED: 8/4/2017 3:13 AM
38. Stuxnet is a notorious computer _______.
ANSWER: worm
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:14 AM
DATE MODIFIED: 8/4/2017 3:14 AM
39. Similar to a worm, a trojan is not designed to spread itself to other devices.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:15 AM
DATE MODIFIED: 8/4/2017 3:16 AM
Copyright Cengage Learning. Powered by Cognero. Page 10
Name: Class: Date:
Module 07: Digital Security
40. Most trojans are not designed to replicate themselves.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:16 AM
DATE MODIFIED: 8/4/2017 3:17 AM
41. A(n) is a computer program that seems to perform one function while actually doing something else.
ANSWER: trojan
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:17 AM
DATE MODIFIED: 8/4/2017 3:18 AM
42. are standalone programs that masquerade as useful utilities or applications.
ANSWER: Trojans
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:18 AM
DATE MODIFIED: 8/4/2017 3:19 AM
43. Trojans depend on to spread.
a. self-replication
b. social engineering
c. rootkits
d. code injection
ANSWER: b
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:19 AM
DATE MODIFIED: 8/4/2017 3:21 AM
44. A(n) is designed to deliver malicious code into a device.
Copyright Cengage Learning. Powered by Cognero. Page 11
Name: Class: Date:
Module 07: Digital Security
ANSWER: dropper
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:21 AM
DATE MODIFIED: 8/4/2017 3:22 AM
45. Any data entering a digital device could be malware.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:22 AM
DATE MODIFIED: 8/4/2017 3:23 AM
46. The best defense against malware is _____________.
a. encryption
b. entropy
c. antivirus software
d. all of the above
ANSWER: c
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:25 AM
DATE MODIFIED: 8/4/2017 3:26 AM
47. A virus is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
ANSWER: signature
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:26 AM
DATE MODIFIED: 8/4/2017 3:27 AM
48. Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
behavior of suspicious files.
a. heuristic analysis
b. virus signature
c. side-loading
d. port scan
ANSWER: a
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:28 AM
DATE MODIFIED: 8/4/2017 3:29 AM
49. One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________.
ANSWER: sandbox
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:29 AM
DATE MODIFIED: 8/4/2017 3:29 AM
50. Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:30 AM
DATE MODIFIED: 8/4/2017 3:31 AM
51. When antivirus software detects malware, which of the following would not be a course of action you could take?
a. Conduct a heuristic analysis.
b. Repair the infection.
c. Put the infected file into quarantine.
d. Delete the infected file.
ANSWER: a
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
DATE CREATED: 8/4/2017 3:31 AM
DATE MODIFIED: 8/4/2017 3:32 AM
52. Once you have installed antivirus software, you don’t typically need to keep it running full time in the background.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:32 AM
DATE MODIFIED: 8/4/2017 3:33 AM
53. A virus usually arrives as an email message that contains warnings about a fake virus.
a. payload
b. signature
c. hoax
d. dropper
ANSWER: c
POINTS: 1
REFERENCES: ANTIVIRUS SOFTWARE
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:33 AM
DATE MODIFIED: 8/4/2017 3:34 AM
54. A(n) takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
a. address spoofing exploit
b. online intrusion
c. brute force attack
d. rogue antivirus
ANSWER: b
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:35 AM
DATE MODIFIED: 8/4/2017 3:36 AM
55. Which of the following sequence of events best describes an online intrusion?
a. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that
Copyright Cengage Learning. Powered by Cognero. Page 14
Name: Class: Date:
Module 07: Digital Security
a hacker can exploit.
b. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
c. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
d. None of the above.
ANSWER: a
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:36 AM
DATE MODIFIED: 8/4/2017 3:38 AM
56. A(n) is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
a. DDoS
b. TLS
c. PUP
d. RAT
ANSWER: d
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:38 AM
DATE MODIFIED: 8/4/2017 3:40 AM
57. A(n) is an undocumented method of accessing a digital device.
ANSWER: backdoor
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:40 AM
DATE MODIFIED: 8/4/2017 3:40 AM
58. RATs can be used to create a backdoor to a victim’s device that takes control of the device’s camera.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: True / False
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:41 AM
DATE MODIFIED: 8/4/2017 3:42 AM
59. If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utility is turned off.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:42 AM
DATE MODIFIED: 8/4/2017 3:43 AM
60. locks a device and then requests payment for an unlocking code.
ANSWER: Ransomware
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:44 AM
DATE MODIFIED: 8/4/2017 3:44 AM
61. Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.
ANSWER: botnet
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:50 AM
DATE MODIFIED: 8/4/2017 3:50 AM
62. A botnet has a server that is controlled by hackers.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: True / False
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 16
Name: Class: Date:
Module 07: Digital Security
DATE CREATED: 8/4/2017 3:51 AM
DATE MODIFIED: 8/4/2017 3:52 AM
63. can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
a. DDoS
b. An AES service attack
c. A Floodping attack
d. All of the above
ANSWER: a
POINTS: 1
REFERENCES: INTRUSION THREATS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:53 AM
DATE MODIFIED: 8/4/2017 3:54 AM
64. Correctly installed antivirus software will prevent all intrusions.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:54 AM
DATE MODIFIED: 8/4/2017 3:56 AM
65. Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:57 AM
DATE MODIFIED: 8/4/2017 3:58 AM
66. A(n) attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
a. zero-day
b. rootkit
c. brute force
Copyright Cengage Learning. Powered by Cognero. Page 17
Name: Class: Date:
Module 07: Digital Security
d. dictionary
ANSWER: a
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 3:58 AM
DATE MODIFIED: 8/4/2017 3:59 AM
67. software shields certain applications against behaviors commonly exhibited by intrusions.
a. Malware
b. Rootkit
c. Antivirus
d. Virus signature
ANSWER: c
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 4:00 AM
DATE MODIFIED: 8/4/2017 4:01 AM
68. If you suspect that your computer might be infected by a zero-day exploit, launching a(n) with a product such as Malwarebytes might identify the infection.
a. on-demand scan
b. rootkit
c. botnet
d. DDoS
ANSWER: a
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 4:01 AM
DATE MODIFIED: 8/4/2017 4:02 AM
69. Hackers can use ports to communicate with devices in botnets.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: NETSTAT
QUESTION TYPE: True / False
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:08 AM
DATE MODIFIED: 8/4/2017 5:09 AM
70. A(n) pings a packet of data to a port in order to see if that port is open or not.
a. rootkit
b. port scan
c. virus signature
d. heuristic analysis
ANSWER: b
POINTS: 1
REFERENCES: NETSTAT
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:09 AM
DATE MODIFIED: 8/4/2017 5:10 AM
71. A network utility called produces a detailed list of open ports on a device.
ANSWER: Netstat
POINTS: 1
REFERENCES: NETSTAT
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:12 AM
DATE MODIFIED: 8/4/2017 5:13 AM
72. A(n) is a device or software that is designed to block unauthorized access while allowing authorized communications.
a. Netstat
b. firewall
c. Evil Twin
d. digital certificate
ANSWER: b
POINTS: 1
REFERENCES: FIREWALLS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:16 AM
DATE MODIFIED: 8/4/2017 5:16 AM
73. Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
a. Network router
Copyright Cengage Learning. Powered by Cognero. Page
Name: Class: Date:
Module 07: Digital Security
b. Personal firewall
c. Hardware that uses NAT (network address translation)
d. All of the above
ANSWER: d
POINTS: 1
REFERENCES: FIREWALLS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:17 AM
DATE MODIFIED: 8/4/2017 5:18 AM
74. Any software that secretly gathers personal information without the victim’s knowledge is classified as
ANSWER: spyware
POINTS: 1
REFERENCES: INTERCEPTION BASICS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:18 AM
DATE MODIFIED: 8/4/2017 5:19 AM
75. Which of the following would be considered spyware?
a. A keylogger
b. Firewall software
c. Antivirus software
d. All of the above
ANSWER: a
POINTS: 1
REFERENCES: INTERCEPTION BASICS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:21 AM
DATE MODIFIED: 8/4/2017 5:22 AM
76. MITM (man-in-the-middle) attacks include which of the following?
a. Address spoofing
b. IMSI catchers
c. Evil Twins
d. All of the above
ANSWER: d
POINTS: 1
REFERENCES: INTERCEPTION BASICS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
DATE CREATED: 8/4/2017 5:22 AM
DATE MODIFIED: 8/4/2017 5:23 AM
77. The objective of a MITM attack is for a third party to block communications between two entities.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: INTERCEPTION BASICS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:24 AM
DATE MODIFIED: 8/4/2017 5:25 AM
78. A(n) is a hacker’s LAN server that is designed to look like a legitimate Wi-Fi hotspot.
ANSWER: Evil Twin
POINTS: 1
REFERENCES: EVIL TWINS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:26 AM
DATE MODIFIED: 8/4/2017 5:27 AM
79. To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.
a. keylogger
b. Evil Twin
c. botnet
d. none of the above
ANSWER: b
POINTS: 1
REFERENCES: EVIL TWINS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:27 AM
DATE MODIFIED: 8/4/2017 5:29 AM
80. changes an originating address or a destination address to redirect the flow of data between two parties.
a. Social engineering
b. IMSI catching
c. Address spoofing
d. All of the above
ANSWER: c
POINTS: 1
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
REFERENCES: ADDRESS SPOOFING
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:30 AM
DATE MODIFIED: 8/4/2017 5:32 AM
81. If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: DIGITAL CERTIFICATE HACKS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:33 AM
DATE MODIFIED: 8/4/2017 5:34 AM
82. The current method of encrypting communication between a client and a server depends on a security protocol called _______.
a. RAT
b. TLS
c. PUP
d. AES
ANSWER: b
POINTS: 1
REFERENCES: DIGITAL CERTIFICATE HACKS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:34 AM
DATE MODIFIED: 8/4/2017 5:35 AM
83. is a 64-bit number that uniquely identifies a cellular device.
ANSWER: IMSI
POINTS: 1
REFERENCES: IMSI CATCHERS
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:35 AM
DATE MODIFIED: 8/4/2017 5:36 AM
84. is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
a. Evil Twin
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
b. Address spoofing
c. Social engineering
d. None of the above
ANSWER: c
POINTS: 1
REFERENCES: SOCIAL ENGINEERING BASICS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:36 AM
DATE MODIFIED: 8/4/2017 5:37 AM
85. is a term for a person who devises and carries out a scam in order to accomplish a goal.
a. Man-in-the-middle
b. RAT
c. Internet worm
d. None of the above
ANSWER: d
POINTS: 1
REFERENCES: SOCIAL ENGINEERING BASICS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:39 AM
DATE MODIFIED: 8/4/2017 5:40 AM
86. Social engineering attacks prey on human vulnerabilities.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: SOCIAL ENGINEERING BASICS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:41 AM
DATE MODIFIED: 8/4/2017 5:41 AM
87. A social engineering scam called is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.
a. advance fee fraud
b. pharming
c. address spoofing
d. Evil Twin
ANSWER: a
POINTS: 1
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
REFERENCES: SOCIAL ENGINEERING BASICS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:41 AM
DATE MODIFIED: 8/4/2017 5:42 AM
88. is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.
ANSWER: Spam
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:43 AM
DATE MODIFIED: 8/4/2017 5:44 AM
89. Spam sent by scammers often uses spoofed email addresses.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:44 AM
DATE MODIFIED: 8/4/2017 5:45 AM
90. Most mass-mailing databases are legitimately compiled from customer lists.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:45 AM
DATE MODIFIED: 8/4/2017 5:46 AM
91. Spam accounts for approximately of all email.
a. 40%
b. 50%
c. 60%
d. 70%
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
ANSWER: d
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:46 AM
DATE MODIFIED: 8/4/2017 5:47 AM
92. The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:48 AM
DATE MODIFIED: 8/4/2017 5:49 AM
93. is a term describing spam that uses a deceptive message to trick victims into participating.
ANSWER: Pretexting
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:49 AM
DATE MODIFIED: 8/4/2017 5:50 AM
94. Most ISPs and email services do not use filtering techniques to block spam.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:50 AM
DATE MODIFIED: 8/4/2017 5:51 AM
95. A spam uses a set of rules to examine email messages and determine which are spam.
ANSWER: filter
POINTS: 1
REFERENCES: SPAM
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:52 AM
DATE MODIFIED: 8/4/2017 5:53 AM
96. Which of the following is not a type of spam filter?
a. Content
b. Permission
c. Blacklist
d. Entropy
ANSWER: d
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:54 AM
DATE MODIFIED: 8/4/2017 5:55 AM
97. Blacklist and header filtering are usually performed by email clients and Webmail services.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: SPAM
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:56 AM
DATE MODIFIED: 8/4/2017 5:57 AM
98. is a mass-mailing scam that masquerades as a message from a legitimate source.
ANSWER: Phishing
POINTS: 1
REFERENCES: PHISHING
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:57 AM
DATE MODIFIED: 8/4/2017 5:57 AM
99. exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.
a. Malware
b. Rootkit
c. Spear phishing
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
d. Keylogger
ANSWER: c
POINTS: 1
REFERENCES: PHISHING
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:58 AM
DATE MODIFIED: 8/4/2017 5:59 AM
100. redirects Web site traffic to fraudulent Web sites.
ANSWER: Pharming
POINTS: 1
REFERENCES: PHARMING
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 5:59 AM
DATE MODIFIED: 8/4/2017 5:59 AM
101. Pharming attacks carried out by domain name system (DNS) spoofing can be detected by antivirus software or spyware removal software.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: PHARMING
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:00 AM
DATE MODIFIED: 8/4/2017 6:00 AM
102. is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
a. Personal firewall
b. Safe Browsing
c. Heuristic analysis
d. SmartScreen Filter
ANSWER: b
POINTS: 1
REFERENCES: PHARMING
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:01 AM
DATE MODIFIED: 8/4/2017 6:02 AM
Copyright Cengage Learning. Powered by Cognero.
Name: Class: Date:
Module 07: Digital Security
103. Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: PHARMING
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:02 AM
DATE MODIFIED: 8/4/2017 6:03 AM
104. A exploit usually begins with a virus warning and an offer to disinfect the infected device.
a. rogue antivirus
b. virus hoax
c. RAT
d. backdoor
ANSWER: a
POINTS: 1
REFERENCES: ROGUE ANTIVIRUS
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:03 AM
DATE MODIFIED: 8/4/2017 6:04 AM
105. The most common types of PUPs and PUAs are toolbars and alternative browsers.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: PUAs
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:04 AM
DATE MODIFIED: 8/4/2017 6:06 AM
106. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
a. RAT
b. PUP
c. Evil Twin
d. Adware
ANSWER: b
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page
Name: Class: Date:
Module 07: Digital Security
REFERENCES: PUAs
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:06 AM
DATE MODIFIED: 8/4/2017 6:07 AM
107. increases security by verifying identity based on more than just a password or PIN.
a. RAT
b. A hash value
c. Two-factor authentication
d. HTTPS
ANSWER: c
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:08 AM
DATE MODIFIED: 8/4/2017 6:09 AM
108. Antivirus software’s on-access scanning has a high probability of identifying zero-day exploits.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: ZERO-DAY ATTACKS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:10 AM
DATE MODIFIED: 8/4/2017 6:11 AM
109. A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: TROJANS
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 6:11 AM
DATE MODIFIED: 8/4/2017 6:12 AM
Copyright Cengage Learning. Powered by Cognero.