CHAPTER9 Multiple Choice 1. Which is a characteristic of a strong password? a. A length of less than 5 characters b. A familiar word or the name of a family member or pet c. The use of characters, both upper and lower case, numbers, and special characters d. The use of an important date like a birth date or anniversary date 2. Which is not a benefit of cookies? a. They are used by online shopping carts to hold items prior to checkout. b. They can hold information like login and password, thus making it easier for individuals to login. c. They do not take up much disk space. d. They can be used to track a user’s browser activity. 3. In public key encryption, which item is kept by the owner of the key? a. Public key b. Private Key “Encryption Basics” c. Digital key d. Rootkit 4. Who is an individual that deliberately attempts to obtain unauthorized access to a computer or network system with the intent to do harm? a. Zombie b. Bot c. Hacker d. Cracker “Meet the Attackers” 5. What is the process of observing the behavior of employees, including phone calls, emails, and Web browsing habits, with or without the aid of computers? a. Phishing b. Employee monitoring “Protecting Your Privacy” c. Computer forensics d. Backdoor 6. Which of the following is an example of malware? a. Employee monitoring programs b. Globally unique identifiers c. Time bombs “Types of Computer Crime” d. Active badges 7. What is a type of software program that records all the keystrokes a user enters—such as passwords, account numbers, or conversations—and relays them to others? a. Keylogger “Types of Computer Crime” b. Data diddler c. Macro d. Time bomb 8. Which is a form of malware that installs itself on the beginning tracks of a hard drive, where stored code is automatically executed every time you start the computer, and spreads the infection by simply starting the system? a. Macro virus b. Rootkit c. Boot sector virus “Types of Computer Crime” d. Botnet 9. What is the name given to commandeered computers that are often used by botnets to distribute spam and malware? a. Zombies “Types of Computer Crime” b. Backdoor c. Rootkits d. Time bombs 10. Which is an online shopping and security standard for merchants and customers? a. 802.11n b. WPA c. GUID d. SET “Encryption Basics”