public-key encrypts

advertisement
CHAPTER9
Multiple Choice
1. Which is a characteristic of a strong password?
a. A length of less than 5 characters
b. A familiar word or the name of a family member or pet
c. The use of characters, both upper and lower case, numbers, and special
characters
d. The use of an important date like a birth date or anniversary date
2. Which is not a benefit of cookies?
a. They are used by online shopping carts to hold items prior to checkout.
b. They can hold information like login and password, thus making it easier for
individuals to login.
c. They do not take up much disk space.
d. They can be used to track a user’s browser activity.
3. In public key encryption, which item is kept by the owner of the key?
a. Public key
b. Private Key
“Encryption Basics”
c. Digital key
d. Rootkit
4. Who is an individual that deliberately attempts to obtain unauthorized access to a
computer or network system with the intent to do harm?
a. Zombie
b. Bot
c. Hacker
d. Cracker “Meet the Attackers”
5. What is the process of observing the behavior of employees, including phone calls, emails, and
Web browsing habits, with or without the aid of computers?
a. Phishing
b. Employee monitoring
“Protecting Your Privacy”
c. Computer forensics
d. Backdoor
6. Which of the following is an example of malware?
a. Employee monitoring programs
b. Globally unique identifiers
c. Time bombs
“Types of Computer Crime”
d. Active badges
7. What is a type of software program that records all the keystrokes a user enters—such
as passwords,
account numbers, or conversations—and relays them to others?
a. Keylogger “Types of Computer Crime”
b. Data diddler
c. Macro
d. Time bomb
8. Which is a form of malware that installs itself on the beginning tracks of a hard drive,
where stored
code is automatically executed every time you start the computer, and spreads the
infection by simply
starting the system?
a. Macro virus
b. Rootkit
c. Boot sector virus “Types of Computer Crime”
d. Botnet
9. What is the name given to commandeered computers that are often used by botnets to
distribute spam and malware?
a. Zombies “Types of Computer Crime”
b. Backdoor
c. Rootkits
d. Time bombs
10. Which is an online shopping and security standard for merchants and customers?
a. 802.11n
b. WPA
c. GUID
d. SET “Encryption Basics”
Download