Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Chapter 6: Network and Internet Security and Privacy   TRUE/FALSE        1

Chapter 6: Network and Internet Security and Privacy   TRUE/FALSE        1

Computer Science

Chapter 6: Network and Internet Security and Privacy

 

TRUE/FALSE

 

     1.   Cybercrime includes any illegal act involving a computer.

 

 

     2.   Wi-Fi piggybacking typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to.

 

     3.   A computer worm does not infect other computer files on the infected computer to replicate itself; it spreads by creating copies of its code and sending those copies to other computers via a network.

 

     4.   The figure above represents a DoS attack.

 

     5.   Digital certificates are granted to a user by the ISP that hosts the user’s account.

 

     6.   A stolen password is an example of hardware theft.

 

     7.   A hard drive that uses STP is often referred to as a self-encrypting hard drive.

 

     8.   A UPS typically provides enough power for a user to save open documents and shut down a computer properly if the power goes out.

 

     9.   A firewall creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.

 

   10.   Collecting in-depth information about an individual is known as spamming.

 

MODIFIED TRUE/FALSE

 

     1.   Spamming refers to the act of breaking into a computer or network.

 

     2.   A computer controlled by a computer criminal is referred to as a(n) zombie computer.

 

     3.   DDoS attacks are typically performed by botnets.

 

     4.   Pharming is the use of a spoofed email message to trick the recipient into revealing sensitive personal information.

 

 

     5.   All 50 states have made cyberstalking illegal.

 

 

     6.   FDE devices are designed to withstand much more physical abuse than conventional devices.

 

     7.   Dot con software protects a computer against malware.

 

     8.   The URL for Web pages using SSL begins with https:.

 

 

     9.   Market filtering refers to following a predesignated procedure to remove yourself from marketing lists, or otherwise preventing your personal information from being obtained or shared by others.

 

 

   10.   Presence technology is the ability of one computing device on a network to identify another device on the same network and determine its status.

 

MULTIPLE CHOICE

 

     1.   ____ is a cybercrime.

a.

Hacking

c.

Using a computer to make illegal copies of DVDs

b.

Using a computer to create counterfeit currency

d.

all of the above

 

 

     2.   Many organizations and institutions publish guidelines for behavior called ____.

a.

fair use policies

c.

morality tales

b.

codes of conduct

d.

chivalric codes

 

 

 

     3.   Hacking most often occurs ____.

a.

in rural parts of the United States

c.

over the Internet or another network

b.

when an attacker has physical access to a vulnerable computer

d.

on college campuses

 

 

     4.   Sitting at your home and using somebody else’s Wi-Fi hotspot to access the Internet without their knowledge would be considered ____.

a.

legal and ethical

c.

multithreading

b.

war driving

d.

Wi-Fi piggybacking

 

 

     5.   ____ is an act of malicious destruction to a computer or computer resource.

a.

Computer sabotage

c.

Hacking

b.

Cyberterrorism

d.

A dot con

 

 

 

     6.   ____ is a generic term that refers to any type of malicious software.

a.

Malware

c.

Virus

b.

Trojan horse

d.

Dot con

 

 

 

     7.   A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

a.

worm

c.

virus

b.

Trojan horse

d.

DDoS

 

 

     8.   A ____ is a type of malware that masquerades as something else.

a.

switchbot

c.

Trojan horse

b.

zombie

d.

worm

 

 

     9.   The figure above shows an example of a(n) ____.

a.

DoS attack

c.

worm

b.

virus

d.

mail bomb

 

 

   10.   DDoS attacks are typically carried out by ____.

a.

viruses

c.

cadres of criminal gangs

b.

botnets

d.

rival corporations

 

 

 

   11.   ____ occurs when someone obtains enough information about a person to be able to masquerade as that person.

a.

Spoofing

c.

Identity theft

b.

Pharming

d.

Data theft

 

 

   12.   ____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information.

a.

Spamming

c.

Barnstorming

b.

Pharming

d.

Phishing

 

 

   13.   ____ emails are directly targeted to a specific individual, usually in order to steal intellectual property.

a.

Spear phishing

c.

Pharming

b.

PhinePrint

d.

Potshot

 

 

 

   14.   A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be.

a.

phished

c.

spoofed

b.

spear phished

d.

sponged

 

 

 

   15.   Buying a product on eBay and then never receiving it is an example of ____.

a.

hacking

c.

auction pharming

b.

online auction fraud

d.

war driving

 

 

 

   16.   The best protection against many dot cons is ____.

a.

common sense

c.

a proactive local police force

b.

good luck

d.

a firewall

 

 

 

   17.   A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn’t been tampered with after it was sent.

a.

valid IP packet list

c.

digital signature

b.

Wi-Fi piggyback

d.

e-thumbprint

 

 

 

   18.   Repeated harassment carried out online between adults is referred to as ____.

a.

cyberbullying

c.

a flame war

b.

cyberstalking

d.

cyberterrorism

 

 

 

   19.   The first federal law specifically targeting cyberstalking was implemented in ____.

a.

1999

c.

2010

b.

2002

d.

as of the writing of this book, there are none

 

 

 

   20.   According to FBI statistics, the recovery rate of a lost or stolen personal computer is about ____ percent.

a.

2-3

c.

22

b.

10

d.

60

 

 

 

   21.   It would take a computer program ____ to crack a five-character password.

a.

8 hours

c.

an hour

b.

24-30 hours

d.

less than a minute

 

 

 

   22.   FDE stands for ____.

a.

fixed data error

c.

full disk encryption

b.

found-device ethics

d.

file displacement encoding

 

 

 

   23.   A fingerprint reader is an example of a(n) ____ security feature.

a.

holistic

c.

ephemeral

b.

biometric

d.

trivial

 

 

 

   24.   A strong password ____.

a.

is at least eight characters long

c.

does not form words found in the dictionary

b.

uses letters, numbers, and symbols

d.

all of the above

 

 

 

   25.   A(n) ____ tag is a label applied to a piece of hardware that identifies the owner, and is either indestructible or tamper-evident.

a.

asset

c.

tracer

b.

LoJack

d.

FDE

 

 

   26.   ____ devices are designed to withstand much more physical abuse than conventional devices.

a.

Hard-dipped

c.

Modulated

b.

Ruggedized

d.

Encapsulated

 

 

   27.   A(n) ____ prevents power spikes from harming your computer system.

a.

surge suppressor

c.

rugged frame

b.

UPS

d.

antivirus suite

 

 

   28.   Box ____ in the figure above shows a typical UPS for home computers.

a.

A

c.

C

b.

B

d.

D

 

 

 

   29.   ____ can be dangerous to a computer.

a.

Static

c.

Heat

b.

Moisture

d.

all of the above

 

 

 

   30.   The term hot site is related most closely to the term ____.

a.

Wi-Fi network

c.

disaster recovery plan

b.

security software

d.

marketing database

 

 

 

   31.   A(n) ____ creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.

a.

botnet

c.

bandwall

b.

firewall

d.

IP sync

 

 

 

   32.   Encryption turns data into a form known as a ____.

a.

cipher

c.

modulation

b.

crypt

d.

bitstream

 

 

 

   33.   ____ encryption is also called symmetric encryption.

a.

Public key

c.

Handshaking

b.

Private key

d.

none of the above

 

 

 

   34.   A(n) ____ is used when a continuous secure channel over the Internet is needed.

a.

FDE

c.

VoIP

b.

data stream

d.

VPN

 

 

 

   35.   ____ databases contain demographic data that is used for sending advertisements that fit an individual’s interests.

a.

Marketing

c.

Pharm

b.

Government

d.

Opted

 

 

 

   36.   Symantec’s MessageLabs recently estimated that more than ____ percent of all email messages is spam.

a.

10-15

c.

99

b.

90

d.

50

 

 

 

   37.   ____ refers to following a predesignated procedure to remove yourself from marketing lists.

a.

Downsizing

c.

Opting out

b.

Rabbitholing

d.

Derofiling

 

 

 

   38.   ____ technology is the ability of one computing device on a network to identify another device on the same network and determine its status.

a.

Presence

c.

Tunneling

b.

VPN

d.

GPS triangulating

 

 

 

   39.   The ____ Act implements regulations for unsolicited email messages.

a.

USA PATRIOT

c.

Computer Fraud and Abuse

b.

Sarbanes-Oxley

d.

none of the above

 

 

 

   40.   Referring to the text in this chapter, CPO stands for ____.

a.

chief privacy officer

c.

cellular privacy ordinance

b.

continuous protocol observation

d.

certified personal ownership

 

 

 

Case-Based Critical Thinking Questions

 

Case 6-1

You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing.

 

   41.   One evening you notice that your Internet seems to be running slower than normal. You look out your living room window and see a strange car parked on the street in front of your house, and someone’s inside. It is possible you are being subjected to ____.

a.

war driving

c.

botnetting

b.

Wi-Fi piggybacking

d.

a dot con

 

 

 

   42.   You live in a 20-unit apartment building. You notice that your wireless Internet seems to run more slowly many evenings, after your neighbors have come home from work. It is possible you are being subjected to ____.

a.

war driving

c.

botnetting

b.

Wi-Fi piggybacking

d.

a dot con

 

 

 

   43.   You have found an interesting calendar program at a Web site and downloaded it to help you stay organized. However, within a couple days of installing the program, your computer starts behaving oddly. Strange popups appear, the home page of your Internet browser has been switched, and the system is running sluggishly. You likely have installed a ____.

a.

virus

c.

Trojan horse

b.

worm

d.

botnet

 

 

 

   44.   You have received an email from your bank asking you to update your account information and verify your password. Suspicious, you hover your mouse over one of the links in the email. It turns out that the actual link does not go to the bank’s Web site, but to another site you are unfamiliar with. Knowing what you do about data theft, you assume that the bank’s true Web site has been ____ at this Web site in order to trick people into giving their personal information to a thief.

a.

phished

c.

pharmed

b.

spearphished

d.

spoofed

 

 

 

   45.   A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____.

a.

cyberterrorism

c.

online harassment

b.

identity theft

d.

firewalling

 

 

 

   46.   Lastly, you are planning to do a lot of business travel in the near future. You will be bringing your laptop computer with you. You look into ways to secure the information on your computer, and decide that the most secure is to ____.

a.

ruggedize your computer case

c.

bring a surge suppressor and UPS wherever you go

b.

install a hard drive that uses FDE

d.

update the firewall on your home’s wireless router

 

 

 

Case-Based Critical Thinking Questions

 

Case 6-2

Each question contains a brief list of things commonly associated with daily life. Examine the list, then choose the answer that most closely correlates to the list.

 

   47.   A driver’s license, a speeding ticket, a birth certificate

a.

surveillance technology

c.

government databases

b.

marketing databases

d.

opting out

 

 

 

   48.   Your subscriptions to magazines, Facebook postings about things you like or own, a store’s record of your online purchase

a.

cyberstalking

c.

employee monitoring

b.

marketing databases

d.

presence technology

 

 

 

   49.   A great new stock deal, a “send this to 20 of your friends” note, unwanted advertising

a.

government databases

c.

COPA

b.

spam

d.

computer monitoring software

 

 

 

   50.   PROTECT, CAN-SPAM, Sarbanes-Oxley, No Electronic Theft

a.

computer network and Internet security legislation

c.

security suites

b.

computer security and privacy legislation

d.

state- and city-level security/privacy ordinances

 

 

 

COMPLETION

 

     1.   ____ access occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

 

 

     2.   The text says that ____ percent of Wi-Fi networks are left unsecured.

 

     3.   A group of zombie computers that are controlled by one individual and can work together in a coordinated fashion is called a(n) ____.

 

 

     4.   Often, a worm is sent to other computers via an email ____.

 

 

     5.   Computer crimes involving online fraud, theft, scams, and related activities designed to steal money or other resources from individuals or businesses are collectively referred to as ____.

 

     6.   A hacker changing the IP addresses used in conjunction with a particular company to re-route them to the hacker’s servers is called DNS ____.

 

     7.   ____ certificates include a public/private key pair.

 

     8.   The complete malfunction of a computer system is called ____.

 

     9.   To protect hardware from damage due to power fluctuations, everyone should use a(n) ____ with a computer whenever it is plugged into a power outlet.

 

   10.   Firewalls, antispyware products, and antivirus products fall under the category of ____ software.

 

   11.   ____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals.

 

 

   12.   The figure above is an example of ____ encryption.

 

   13.   Collecting in-depth information about an individual is known as ____.

 

 

   14.   One way to protect the privacy of your personal information is to use a(n) ____ email address.

 

 

   15.   ____ is closed circuit security cameras used to monitor activities taking place at facilities for security purposes.

 

MATCHING

 

 

a.

Trojan horse

g.

digital certificate

b.

UPS

h.

zombie

c.

disaster recovery plan

i.

privacy policy

d.

hacking

j.

spam filter

e.

presence technology

k.

worm

f.

FDE

l.

identity theft

 

 

     1.   an easy way to protect the data on an entire computer in case it is stolen

 

     2.   malware that spreads by sending copies of itself via a network

 

     3.   used to capture junk email

 

     4.   computer controlled by a criminal

 

     5.   a statement about how an organization uses personal information

 

     6.   keeps a desktop computer powered up in case the electricity goes off

 

     7.   using information about a person to masquerade as him or her

 

     8.   malware that masquerades as something else

 

     9.   breaking into a computer or network

 

   10.   sometimes includes use of a hot site

 

   11.   the ability of one network computing device to identify another

 

   12.   used to authenticate the identity of an individual or organization

 

ESSAY

 

     1.   Describe the example the chapter gives for how a virus might be created and spread.

 

     2.   What are four ways the chapter mentions to protect yourself against personal cyberstalking and other types of online harassment?

 

     3.   List six precautions you should keep in mind when using portable computers and other mobile devices to protect against hardware loss and theft.

 

Option 1

Low Cost Option
Download this past answer in few clicks

5.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE