Chapter 11

advertisement
Chapter 11
True/False
Darken the letter on a Scantron that indicates whether the sentence or statement is true or false.
1. Like a virus or worm, a Trojan horse replicates itself to other computers.
2. Most systems require that users select their own passwords.
3. Examples of possessed objects are badges, cards, smart cards, and keys.
4. Possessed objects often are used in combination with personal identification numbers.
5. The best preventive measures against hardware theft and vandalism are common sense and a constant
awareness of the risk.
6. Software piracy is by far the least common form of software theft.
7. Most organizations use available software packages for encryption.
8. All surge protectors are 100 percent effective.
9. The higher a surge protector’s Joule rating, the poorer the protection.
10. A growing trend is to use an Internet hard drive as an offsite location for backup copies.
11. Some users implement a three-generation backup policy to preserve three copies of important files.
12. S-HTTP is easier to use than SSL, but it is less secure.
13. A copyright protects any tangible form of expression.
14. Tendonitis is inflammation of the nerve that connects the forearm to the palm of the wrist.
15. Computer addiction is an untreatable illness.
Multiple Choice
Darken the letter on a Scantron of the choice that best completes the statement or answers the question.
16. A ____ is a malicious-logic program that hides within or looks like a legitimate program and usually is
triggered by a certain condition or action.
a. computer virus
c. Trojan horse
b. worm
d. all of the above
17. Some viruses are hidden in ____, which are instructions saved in an application such as a word processing or
spreadsheet program.
a. macros
c. cookies
b. logs
d. spikes
18. Each character added to a password significantly ____ it might take for someone or for a hacker’s computer
to guess the password.
a. reduces the number of combinations and the length of time
b. reduces the number of combinations but increases the length of time
c. increases the number of combinations but reduces the length of time
d. increases the number of combinations and the length of time
19. Some notebook computers use ____ as methods of security.
a. passwords
c. biometrics
20.
21.
22.
23.
24.
25.
b. possessed objects
d. all of the above
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the
mobile user with a secure connection to the company network server.
a. value added network (VAN)
c. virtual private network (VPN)
b. local area network (LAN)
d. wide area network (WAN)
____, which allows users to choose an encryption scheme that passes between a client and a server, requires
that both the client and server have digital certificates.
a. Secure Sockets Layer (SSL)
b. Secure HTTP (S-HTTP)
c. Secure Electronics Transactions (SET™) Specifications
d. Pretty Good Privacy (PGP)
The ____ uses encryption to secure financial transactions on the Internet.
a. Secure Sockets Layer (SSL)
b. Secure HTTP (S-HTTP)
c. Secure Electronics Transactions (SET™) Specifications
d. Pretty Good Privacy (PGP)
A ____ is a mathematical formula that generates a code from the contents of an e-mail message.
a. spike
c. password
b. macro
d. hash
The 1970 ____ limits the rights of those viewing a credit report to only those with a legitimate business need,
but does not define a legitimate business need.
a. Electronic Communications Privacy Act (ECPA)
b. Fair Credit Reporting Act
c. Computer Fraud and Abuse Act
d. Computer Matching and Privacy Protection Act
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in
the workplace.
a. Ergonomics
c. Epidemics
b. Eurhythmics
d. Econometrics
Chapter 11
Answer Section
TRUE/FALSE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
F
T
T
T
T
F
T
F
F
T
T
F
T
F
F
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
Primary
Primary
Secondary
Secondary
Primary
Primary
Secondary
Primary
Secondary
Secondary
Secondary
Secondary
Primary
Secondary
Primary
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
11.03
11.11
11.12
11.12
11.14
11.14
11.17
11.19
11.19
11.20
11.20
11.22
11.24
11.32
11.35
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
2
3
3
3
4
5
6
7
7
8
8
9
10
12
12
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
DIF:
Primary
Secondary
Primary
Secondary
Secondary
Secondary
Secondary
Secondary
Primary
Secondary
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
11.03
11.05
11.11
11.14
11.17
11.22
11.22
11.23
11.31
11.34
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
OBJ:
2
2
3
4
6
9
9
9
11
12
MULTIPLE CHOICE
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
C
A
D
D
C
B
C
D
B
A
Download