Test bank for new perspectives on computer concepts 2018 comprehensive 20th edition june jamrich par

Page 1

Test Bank for New Perspectives on Computer Concepts 2018:

Comprehensive, 20th Edition, June Jamrich Parsons

To download the complete and accurate content document, go to: https://testbankbell.com/download/test-bank-for-new-perspectives-on-computer-conc epts-2018-comprehensive-20th-edition-june-jamrich-parsons/

Test Bank for New Perspectives on Computer Concepts 2018: Comprehensive, 20th Edition, June Visit TestBankBell.com to get complete for all chapters

Name: Class: Date:

Module 07: Digital Security

1. This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

a. Authentication

b. Encryption

c. Ciphertext

d. Decryption

ANSWER: b

POINTS: 1

REFERENCES: ENCRYPTION

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:28 AM

DATE MODIFIED: 8/4/2017 1:29 AM

2. An original message or file that has not yet been encrypted is referred to as ciphertext.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: ENCRYPTION

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:30 AM

DATE MODIFIED: 8/4/2017 1:31 AM

3. A cryptographic is a word, number, or phrase that must be known to encrypt or decrypt data.

ANSWER: key

POINTS: 1

REFERENCES: ENCRYPTION

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:32 AM

DATE MODIFIED: 8/4/2017 1:32 AM

4. There are various encryption methods, but is the encryption standard currently used worldwide.

a. AES (Advanced Encryption Standard)

b. DDoS (distributed denial of service attacks)

c. IMSI (International Mobile Subscriber Identity)

d. TLS (Transport Layer Security)

ANSWER: a

POINTS: 1

REFERENCES: ENCRYPTION

QUESTION TYPE: Multiple Choice

Copyright Cengage Learning. Powered by Cognero. Page 1

Name: Class: Date:

Module 07: Digital Security

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:33 AM

DATE MODIFIED: 8/4/2017 1:34 AM

5. A cryptographic is a procedure for encryption or decryption.

a. firewall

b. ciphertext

c. key

d. algorithm

ANSWER: d

POINTS: 1

REFERENCES: ENCRYPTION

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:36 AM

DATE MODIFIED: 8/4/2017 1:36 AM

6. Which of the following is not an example of user authentication?

a. Password

b. PINs

c. Fingerprint scanner

d. URLs (Uniform Resource Locators)

ANSWER: d

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:37 AM

DATE MODIFIED: 8/4/2017 1:39 AM

7. The single most effective security measure for digital devices is to require a login password.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:39 AM

DATE MODIFIED: 8/4/2017 1:40 AM

8. Passwords used as encryption help to make hijacked data unusable.

ANSWER: keys

Copyright Cengage Learning. Powered by Cognero.

Page 2

Name: Class: Date:

Module 07: Digital Security

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:40 AM

DATE MODIFIED: 8/4/2017 1:41 AM

9. All Android devices automatically encrypt data stored on the device when a user activates the login password.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:41 AM

DATE MODIFIED: 8/7/2017 3:27 AM

10. It is not possible to encrypt a Windows hard drive volume.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:43 AM

DATE MODIFIED: 8/4/2017 1:43 AM

11. FileVault is a MacOS utility included on by default on Macintosh computers that automatically encrypts data stored locally.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:44 AM

DATE MODIFIED: 8/4/2017 1:44 AM

12. A(n) password is difficult to hack.

ANSWER: strong

Copyright Cengage Learning. Powered by Cognero. Page 3

Name: Class: Date:

Module 07: Digital Security

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 1:45 AM

DATE MODIFIED: 8/4/2017 1:45 AM

13. Conventional wisdom tells us that strong passwords are at least characters in length and include one or more uppercase letters, numbers, and symbols.

ANSWER: eight, 8

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:41 AM

DATE MODIFIED: 8/4/2017 2:42 AM

14. Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?

a. Entropy

b. Massive

c. Dictionary

d. Brute force

ANSWER: d

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:43 AM

DATE MODIFIED: 8/4/2017 2:44 AM

15. Which of the following is not a characteristic of a weak password?

a. Eight characters in length and include one or more uppercase letters, numbers, and symbols

b. Uses default passwords such as password, admin, system, and guest

c. Any sequence that includes a user name

d. Use of a word from a dictionary

ANSWER: a

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:44 AM

DATE MODIFIED: 8/4/2017 2:45 AM

Copyright Cengage Learning. Powered by Cognero. Page 4

Name: Class: Date:

Module 07: Digital Security

16. Brute force attacks methodically try every possible password until the correct one is found.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:47 AM

DATE MODIFIED: 8/4/2017 2:48 AM

17. Password is a measure in bits of a password’s unpredictability.

ANSWER: entropy

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:49 AM

DATE MODIFIED: 8/4/2017 2:49 AM

18. Password entropy is a measure in of a password’s unpredictability.

ANSWER: bits

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:50 AM

DATE MODIFIED: 8/4/2017 2:50 AM

19. If you want to store passwords on a digital device, make sure to the file in which they are stored.

ANSWER: encrypt

POINTS: 1

REFERENCES: STRONG PASSWORDS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:51 AM

DATE MODIFIED: 8/4/2017 2:51 AM

20. If you feel more secure with a totally random and unique password for each of your logins, then a(n) is an excellent option.

a. keylogger

b. encryption key

c. password manager

Copyright Cengage Learning. Powered by Cognero.

Page 5

Name: Class: Date:

Module 07: Digital Security

d. personal firewall

ANSWER: c

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:51 AM

DATE MODIFIED: 8/4/2017 2:53 AM

21. The core function of a password manager is to store user IDs with their corresponding ________.

ANSWER: passwords

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:53 AM

DATE MODIFIED: 8/4/2017 2:53 AM

22. Password managers can generate unique passwords that have very good entropy.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:54 AM

DATE MODIFIED: 8/7/2017 3:28 AM

23. Password managers store passwords in a(n) file.

ANSWER: encrypted

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:55 AM

DATE MODIFIED: 8/4/2017 2:56 AM

24. If you use a password manager, what do you as the user need to remember?

a. Your passwords for individual sites

b. The master password

c. Form data including credit card numbers

d. All of the above

Copyright Cengage Learning. Powered by Cognero.

Page 6

Name: Class: Date:

Module 07: Digital Security

ANSWER: b

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:56 AM

DATE MODIFIED: 8/4/2017 2:57 AM

25. A password manager can store passwords in an encrypted file located at which of the following storage locations?

a. Local storage

b. Cloud storage

c. USB storage

d. All of the above

ANSWER: d

POINTS: 1

REFERENCES: PASSWORD MANAGERS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:57 AM

DATE MODIFIED: 8/4/2017 2:58 AM

26. refers to any computer program designed to surreptitiously enter a digital device.

ANSWER: Malware

POINTS: 1

REFERENCES: MALWARE THREATS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 2:59 AM

DATE MODIFIED: 8/4/2017 2:59 AM

27. The action carried out by malware code is referred to as a(n)

ANSWER: exploit

POINTS: 1

REFERENCES: MALWARE THREATS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:00 AM

DATE MODIFIED: 8/4/2017 3:00 AM

28. Common classifications of include viruses, worms, and trojans.

ANSWER: malware

POINTS: 1

REFERENCES: MALWARE THREATS

Copyright Cengage Learning. Powered by Cognero.

Page 7
_______.

Name: Class: Date:

Module 07: Digital Security

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:01 AM

DATE MODIFIED: 8/4/2017 3:01 AM

29. A computer is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

a. trojan

b. virus

c. worm

d. all of the above

ANSWER: b

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:02 AM

DATE MODIFIED: 8/4/2017 3:03 AM

30. In addition to replicating itself, a virus is self-distributing.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:04 AM

DATE MODIFIED: 8/4/2017 3:05 AM

31. Viruses spread themselves from one device to another.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:05 AM

DATE MODIFIED: 8/4/2017 3:06 AM

32. is the process of modifying an executable file or data stream by adding additional commands.

a. Keylogging

Copyright Cengage Learning. Powered by Cognero. Page

8

Name: Class: Date:

Module 07: Digital Security

b. Pharming

c. Brute force attack

d. Code injection

ANSWER: d

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:06 AM

DATE MODIFIED: 8/4/2017 3:07 AM

33. What is the process called when an app from a source other than an official app store is installed on a device?

a. Side-loading

b. Rootkit

c. Code injection

d. Dropper

ANSWER: a

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:08 AM

DATE MODIFIED: 8/4/2017 3:09 AM

34. Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

ANSWER: rootkit

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:09 AM

DATE MODIFIED: 8/4/2017 3:10 AM

35. A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: COMPUTER VIRUSES

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:10 AM

DATE MODIFIED: 8/4/2017 3:11 AM

Copyright Cengage Learning. Powered by Cognero.

Page 9

Name: Class: Date:

Module 07: Digital Security

36. A computer is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim’s device.

ANSWER: worm

POINTS: 1

REFERENCES: COMPUTER WORMS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:11 AM

DATE MODIFIED: 8/4/2017 3:12 AM

37. Which of the following is not a characteristic of a computer worm?

a. Self-replicating

b. Usually standalone executable programs

c. Self-distributing

d. Spread through a process called side-loading

ANSWER: d

POINTS: 1

REFERENCES: COMPUTER WORMS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:12 AM

DATE MODIFIED: 8/4/2017 3:13 AM

38. Stuxnet is a notorious computer _______.

ANSWER: worm

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:14 AM

DATE MODIFIED: 8/4/2017 3:14 AM

39. Similar to a worm, a trojan is not designed to spread itself to other devices.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:15 AM

DATE MODIFIED: 8/4/2017 3:16 AM

Copyright Cengage Learning. Powered by Cognero. Page 10

Name: Class: Date:

Module 07: Digital Security

40. Most trojans are not designed to replicate themselves.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:16 AM

DATE MODIFIED: 8/4/2017 3:17 AM

41. A(n) is a computer program that seems to perform one function while actually doing something else.

ANSWER: trojan

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:17 AM

DATE MODIFIED: 8/4/2017 3:18 AM

42. are standalone programs that masquerade as useful utilities or applications.

ANSWER: Trojans

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:18 AM

DATE MODIFIED: 8/4/2017 3:19 AM

43. Trojans depend on to spread.

a. self-replication

b. social engineering

c. rootkits

d. code injection

ANSWER: b

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:19 AM

DATE MODIFIED: 8/4/2017 3:21 AM

44. A(n) is designed to deliver malicious code into a device.

Copyright Cengage Learning. Powered by Cognero. Page 11

Name: Class: Date:

Module 07: Digital Security

ANSWER: dropper

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:21 AM

DATE MODIFIED: 8/4/2017 3:22 AM

45. Any data entering a digital device could be malware.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:22 AM

DATE MODIFIED: 8/4/2017 3:23 AM

46. The best defense against malware is _____________.

a. encryption

b. entropy

c. antivirus software

d. all of the above

ANSWER: c

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:25 AM

DATE MODIFIED: 8/4/2017 3:26 AM

47. A virus is a section of program code that contains a unique series of instructions known to be part of a malware exploit.

ANSWER: signature

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:26 AM

DATE MODIFIED: 8/4/2017 3:27 AM

48. Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and

Copyright Cengage Learning. Powered by Cognero.

Page 12

Name: Class: Date:

Module 07: Digital Security

behavior of suspicious files.

a. heuristic analysis

b. virus signature

c. side-loading

d. port scan

ANSWER: a

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:28 AM

DATE MODIFIED: 8/4/2017 3:29 AM

49. One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________.

ANSWER: sandbox

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:29 AM

DATE MODIFIED: 8/4/2017 3:29 AM

50. Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:30 AM

DATE MODIFIED: 8/4/2017 3:31 AM

51. When antivirus software detects malware, which of the following would not be a course of action you could take?

a. Conduct a heuristic analysis.

b. Repair the infection.

c. Put the infected file into quarantine.

d. Delete the infected file.

ANSWER: a

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

Copyright Cengage Learning. Powered by Cognero.

Page 13

Name: Class: Date:

Module 07: Digital Security

DATE CREATED: 8/4/2017 3:31 AM

DATE MODIFIED: 8/4/2017 3:32 AM

52. Once you have installed antivirus software, you don’t typically need to keep it running full time in the background.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:32 AM

DATE MODIFIED: 8/4/2017 3:33 AM

53. A virus usually arrives as an email message that contains warnings about a fake virus.

a. payload

b. signature

c. hoax

d. dropper

ANSWER: c

POINTS: 1

REFERENCES: ANTIVIRUS SOFTWARE

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:33 AM

DATE MODIFIED: 8/4/2017 3:34 AM

54. A(n) takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

a. address spoofing exploit

b. online intrusion

c. brute force attack

d. rogue antivirus

ANSWER: b

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:35 AM

DATE MODIFIED: 8/4/2017 3:36 AM

55. Which of the following sequence of events best describes an online intrusion?

a. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that

Copyright Cengage Learning. Powered by Cognero. Page 14

Name: Class: Date:

Module 07: Digital Security

a hacker can exploit.

b. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.

c. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.

d. None of the above.

ANSWER: a

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:36 AM

DATE MODIFIED: 8/4/2017 3:38 AM

56. A(n) is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

a. DDoS

b. TLS

c. PUP

d. RAT

ANSWER: d

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:38 AM

DATE MODIFIED: 8/4/2017 3:40 AM

57. A(n) is an undocumented method of accessing a digital device.

ANSWER: backdoor

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:40 AM

DATE MODIFIED: 8/4/2017 3:40 AM

58. RATs can be used to create a backdoor to a victim’s device that takes control of the device’s camera.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: True / False

Copyright Cengage Learning. Powered by Cognero.

Page 15

Name: Class: Date:

Module 07: Digital Security

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:41 AM

DATE MODIFIED: 8/4/2017 3:42 AM

59. If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utility is turned off.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:42 AM

DATE MODIFIED: 8/4/2017 3:43 AM

60. locks a device and then requests payment for an unlocking code.

ANSWER: Ransomware

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:44 AM

DATE MODIFIED: 8/4/2017 3:44 AM

61. Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.

ANSWER: botnet

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:50 AM

DATE MODIFIED: 8/4/2017 3:50 AM

62. A botnet has a server that is controlled by hackers.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: True / False

HAS VARIABLES: False

Copyright Cengage Learning. Powered by Cognero. Page 16

Name: Class: Date:

Module 07: Digital Security

DATE CREATED: 8/4/2017 3:51 AM

DATE MODIFIED: 8/4/2017 3:52 AM

63. can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

a. DDoS

b. An AES service attack

c. A Floodping attack

d. All of the above

ANSWER: a

POINTS: 1

REFERENCES: INTRUSION THREATS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:53 AM

DATE MODIFIED: 8/4/2017 3:54 AM

64. Correctly installed antivirus software will prevent all intrusions.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:54 AM

DATE MODIFIED: 8/4/2017 3:56 AM

65. Antivirus software cannot be expected to block threats that do not arrive in the form of malware.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:57 AM

DATE MODIFIED: 8/4/2017 3:58 AM

66. A(n) attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

a. zero-day

b. rootkit

c. brute force

Copyright Cengage Learning. Powered by Cognero. Page 17

Name: Class: Date:

Module 07: Digital Security

d. dictionary

ANSWER: a

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 3:58 AM

DATE MODIFIED: 8/4/2017 3:59 AM

67. software shields certain applications against behaviors commonly exhibited by intrusions.

a. Malware

b. Rootkit

c. Antivirus

d. Virus signature

ANSWER: c

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 4:00 AM

DATE MODIFIED: 8/4/2017 4:01 AM

68. If you suspect that your computer might be infected by a zero-day exploit, launching a(n) with a product such as Malwarebytes might identify the infection.

a. on-demand scan

b. rootkit

c. botnet

d. DDoS

ANSWER: a

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 4:01 AM

DATE MODIFIED: 8/4/2017 4:02 AM

69. Hackers can use ports to communicate with devices in botnets.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: NETSTAT

QUESTION TYPE: True / False

Copyright Cengage Learning. Powered by Cognero.

18
Page

Name: Class: Date:

Module 07: Digital Security

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:08 AM

DATE MODIFIED: 8/4/2017 5:09 AM

70. A(n) pings a packet of data to a port in order to see if that port is open or not.

a. rootkit

b. port scan

c. virus signature

d. heuristic analysis

ANSWER: b

POINTS: 1

REFERENCES: NETSTAT

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:09 AM

DATE MODIFIED: 8/4/2017 5:10 AM

71. A network utility called produces a detailed list of open ports on a device.

ANSWER: Netstat

POINTS: 1

REFERENCES: NETSTAT

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:12 AM

DATE MODIFIED: 8/4/2017 5:13 AM

72. A(n) is a device or software that is designed to block unauthorized access while allowing authorized communications.

a. Netstat

b. firewall

c. Evil Twin

d. digital certificate

ANSWER: b

POINTS: 1

REFERENCES: FIREWALLS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:16 AM

DATE MODIFIED: 8/4/2017 5:16 AM

73. Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

a. Network router

Copyright Cengage Learning. Powered by Cognero. Page

19

Name: Class: Date:

Module 07: Digital Security

b. Personal firewall

c. Hardware that uses NAT (network address translation)

d. All of the above

ANSWER: d

POINTS: 1

REFERENCES: FIREWALLS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:17 AM

DATE MODIFIED: 8/4/2017 5:18 AM

74. Any software that secretly gathers personal information without the victim’s knowledge is classified as

ANSWER: spyware

POINTS: 1

REFERENCES: INTERCEPTION BASICS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:18 AM

DATE MODIFIED: 8/4/2017 5:19 AM

75. Which of the following would be considered spyware?

a. A keylogger

b. Firewall software

c. Antivirus software

d. All of the above

ANSWER: a

POINTS: 1

REFERENCES: INTERCEPTION BASICS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:21 AM

DATE MODIFIED: 8/4/2017 5:22 AM

76. MITM (man-in-the-middle) attacks include which of the following?

a. Address spoofing

b. IMSI catchers

c. Evil Twins

d. All of the above

ANSWER: d

POINTS: 1

REFERENCES: INTERCEPTION BASICS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

Copyright Cengage Learning. Powered by Cognero.

Page 20
__________.

Name: Class: Date:

Module 07: Digital Security

DATE CREATED: 8/4/2017 5:22 AM

DATE MODIFIED: 8/4/2017 5:23 AM

77. The objective of a MITM attack is for a third party to block communications between two entities.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: INTERCEPTION BASICS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:24 AM

DATE MODIFIED: 8/4/2017 5:25 AM

78. A(n) is a hacker’s LAN server that is designed to look like a legitimate Wi-Fi hotspot.

ANSWER: Evil Twin

POINTS: 1

REFERENCES: EVIL TWINS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:26 AM

DATE MODIFIED: 8/4/2017 5:27 AM

79. To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

a. keylogger

b. Evil Twin

c. botnet

d. none of the above

ANSWER: b

POINTS: 1

REFERENCES: EVIL TWINS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:27 AM

DATE MODIFIED: 8/4/2017 5:29 AM

80. changes an originating address or a destination address to redirect the flow of data between two parties.

a. Social engineering

b. IMSI catching

c. Address spoofing

d. All of the above

ANSWER: c

POINTS: 1

Copyright Cengage Learning. Powered by Cognero.

21
Page

Name: Class: Date:

Module 07: Digital Security

REFERENCES: ADDRESS SPOOFING

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:30 AM

DATE MODIFIED: 8/4/2017 5:32 AM

81. If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: DIGITAL CERTIFICATE HACKS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:33 AM

DATE MODIFIED: 8/4/2017 5:34 AM

82. The current method of encrypting communication between a client and a server depends on a security protocol called _______.

a. RAT

b. TLS

c. PUP

d. AES

ANSWER: b

POINTS: 1

REFERENCES: DIGITAL CERTIFICATE HACKS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:34 AM

DATE MODIFIED: 8/4/2017 5:35 AM

83. is a 64-bit number that uniquely identifies a cellular device.

ANSWER: IMSI

POINTS: 1

REFERENCES: IMSI CATCHERS

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:35 AM

DATE MODIFIED: 8/4/2017 5:36 AM

84. is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

a. Evil Twin

Copyright Cengage Learning. Powered by Cognero.

Page 22

Name: Class: Date:

Module 07: Digital Security

b. Address spoofing

c. Social engineering

d. None of the above

ANSWER: c

POINTS: 1

REFERENCES: SOCIAL ENGINEERING BASICS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:36 AM

DATE MODIFIED: 8/4/2017 5:37 AM

85. is a term for a person who devises and carries out a scam in order to accomplish a goal.

a. Man-in-the-middle

b. RAT

c. Internet worm

d. None of the above

ANSWER: d

POINTS: 1

REFERENCES: SOCIAL ENGINEERING BASICS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:39 AM

DATE MODIFIED: 8/4/2017 5:40 AM

86. Social engineering attacks prey on human vulnerabilities.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: SOCIAL ENGINEERING BASICS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:41 AM

DATE MODIFIED: 8/4/2017 5:41 AM

87. A social engineering scam called is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.

a. advance fee fraud

b. pharming

c. address spoofing

d. Evil Twin

ANSWER: a

POINTS: 1

Copyright Cengage Learning. Powered by Cognero.

Page 23

Name: Class: Date:

Module 07: Digital Security

REFERENCES: SOCIAL ENGINEERING BASICS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:41 AM

DATE MODIFIED: 8/4/2017 5:42 AM

88. is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

ANSWER: Spam

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:43 AM

DATE MODIFIED: 8/4/2017 5:44 AM

89. Spam sent by scammers often uses spoofed email addresses.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:44 AM

DATE MODIFIED: 8/4/2017 5:45 AM

90. Most mass-mailing databases are legitimately compiled from customer lists.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:45 AM

DATE MODIFIED: 8/4/2017 5:46 AM

91. Spam accounts for approximately of all email.

a. 40%

b. 50%

c. 60%

d. 70%

Copyright Cengage Learning. Powered by Cognero.

Page 24

Name: Class: Date:

Module 07: Digital Security

ANSWER: d

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:46 AM

DATE MODIFIED: 8/4/2017 5:47 AM

92. The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:48 AM

DATE MODIFIED: 8/4/2017 5:49 AM

93. is a term describing spam that uses a deceptive message to trick victims into participating.

ANSWER: Pretexting

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:49 AM

DATE MODIFIED: 8/4/2017 5:50 AM

94. Most ISPs and email services do not use filtering techniques to block spam.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:50 AM

DATE MODIFIED: 8/4/2017 5:51 AM

95. A spam uses a set of rules to examine email messages and determine which are spam.

ANSWER: filter

POINTS: 1

REFERENCES: SPAM

Copyright Cengage Learning. Powered by Cognero.

Page 25

Name: Class: Date:

Module 07: Digital Security

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:52 AM

DATE MODIFIED: 8/4/2017 5:53 AM

96. Which of the following is not a type of spam filter?

a. Content

b. Permission

c. Blacklist

d. Entropy

ANSWER: d

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:54 AM

DATE MODIFIED: 8/4/2017 5:55 AM

97. Blacklist and header filtering are usually performed by email clients and Webmail services.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: SPAM

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:56 AM

DATE MODIFIED: 8/4/2017 5:57 AM

98. is a mass-mailing scam that masquerades as a message from a legitimate source.

ANSWER: Phishing

POINTS: 1

REFERENCES: PHISHING

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:57 AM

DATE MODIFIED: 8/4/2017 5:57 AM

99. exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.

a. Malware

b. Rootkit

c. Spear phishing

Copyright Cengage Learning. Powered by Cognero.

Page 26

Name: Class: Date:

Module 07: Digital Security

d. Keylogger

ANSWER: c

POINTS: 1

REFERENCES: PHISHING

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:58 AM

DATE MODIFIED: 8/4/2017 5:59 AM

100. redirects Web site traffic to fraudulent Web sites.

ANSWER: Pharming

POINTS: 1

REFERENCES: PHARMING

QUESTION TYPE: Completion

HAS VARIABLES: False

DATE CREATED: 8/4/2017 5:59 AM

DATE MODIFIED: 8/4/2017 5:59 AM

101. Pharming attacks carried out by domain name system (DNS) spoofing can be detected by antivirus software or spyware removal software.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: PHARMING

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:00 AM

DATE MODIFIED: 8/4/2017 6:00 AM

102. is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

a. Personal firewall

b. Safe Browsing

c. Heuristic analysis

d. SmartScreen Filter

ANSWER: b

POINTS: 1

REFERENCES: PHARMING

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:01 AM

DATE MODIFIED: 8/4/2017 6:02 AM

Copyright Cengage Learning. Powered by Cognero.

Page 27

Name: Class: Date:

Module 07: Digital Security

103. Microsoft uses a service called Safe Browsing to alert users about sites to avoid.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: PHARMING

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:02 AM

DATE MODIFIED: 8/4/2017 6:03 AM

104. A exploit usually begins with a virus warning and an offer to disinfect the infected device.

a. rogue antivirus

b. virus hoax

c. RAT

d. backdoor

ANSWER: a

POINTS: 1

REFERENCES: ROGUE ANTIVIRUS

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:03 AM

DATE MODIFIED: 8/4/2017 6:04 AM

105. The most common types of PUPs and PUAs are toolbars and alternative browsers.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: PUAs

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:04 AM

DATE MODIFIED: 8/4/2017 6:06 AM

106. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

a. RAT

b. PUP

c. Evil Twin

d. Adware

ANSWER: b

POINTS: 1

Copyright Cengage Learning. Powered by Cognero. Page

28

Name: Class: Date:

Module 07: Digital Security

REFERENCES: PUAs

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:06 AM

DATE MODIFIED: 8/4/2017 6:07 AM

107. increases security by verifying identity based on more than just a password or PIN.

a. RAT

b. A hash value

c. Two-factor authentication

d. HTTPS

ANSWER: c

POINTS: 1

REFERENCES: AUTHENTICATION

QUESTION TYPE: Multiple Choice

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:08 AM

DATE MODIFIED: 8/4/2017 6:09 AM

108. Antivirus software’s on-access scanning has a high probability of identifying zero-day exploits.

a. True

b. False

ANSWER: False

POINTS: 1

REFERENCES: ZERO-DAY ATTACKS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:10 AM

DATE MODIFIED: 8/4/2017 6:11 AM

109. A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program.

a. True

b. False

ANSWER: True

POINTS: 1

REFERENCES: TROJANS

QUESTION TYPE: True / False

HAS VARIABLES: False

DATE CREATED: 8/4/2017 6:11 AM

DATE MODIFIED: 8/4/2017 6:12 AM

Copyright Cengage Learning. Powered by Cognero.

Page 29
Test Bank for New Perspectives on Computer Concepts 2018: Comprehensive, 20th Edition, June Visit TestBankBell.com to get complete for all chapters

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.