You are on page 1of 17

Computer Concepts Unit F: Data Security

TRUE/FALSE

1. Developing steps to recover from an unavoidable disaster is one step in the process of risk
management.

ANS: T PTS: 1 REF: 146

2. MTBF measures the security risks of a computer system.

ANS: F PTS: 1 REF: 146

3. A voltage spike is another term for power spike.

ANS: T PTS: 1 REF: 146

4. A surge strip offers an uninterruptible power supply.

ANS: F PTS: 1 REF: 149

5. Power strips offer similar protection to surge strips.

ANS: F PTS: 1 REF: 149

6. Biometrics is a method of authentication used to confirm a person’s identity based on some physical
trait.

ANS: T PTS: 1 REF: 150

7. A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave
a computer.

ANS: T PTS: 1 REF: 157

8. A keylogger is a program that secretly records your keystrokes.

ANS: T PTS: 1 REF: 153

9. Worms attach themselves to a file, reproduce, and spread to other files on the same computer.

ANS: F PTS: 1 REF: 152

10. Viruses programmed to deliver their payloads on a certain date are called time bombs.

ANS: T PTS: 1 REF: 152

11. Encryption transforms a message so that its contents are hidden from unauthorized readers.

ANS: T PTS: 1 REF: 157

12. Spam filters are not included in email clients and security suites.
ANS: F PTS: 1 REF: 159

13. One of email’s main disadvantages is spam.

ANS: T PTS: 1 REF: 159

14. Some Web sites offer fee-based backup storage space.

ANS: T PTS: 1 REF: 160

15. A boot disk contains a complete copy of your computer’s hard disk as it existed when shipped from the
manufacturer.

ANS: F PTS: 1 REF: 161

MODIFIED TRUE/FALSE

1. The power strip shown in the figure above is an appliance designed to protect electrical devices from
power surges and voltage spikes. _________________________

ANS: F, surge

PTS: 1 REF: 149


2. A security suite, which integrates several security modules, is shown in the figure above.
_________________________

ANS: T PTS: 1 REF: 154

3. LANjackers use network-detecting and monitoring software, like the software shown in the figure
above, to help locate and identify secured and unsecured networks. _________________________

ANS: T PTS: 1 REF: 156


4. Windows Vista includes firewall software, as shown above, and can be configured from the Support
Center. _________________________

ANS: F, Security

PTS: 1 REF: 157

5. Publications like the one shown above help risk management professionals design and update disaster
recovery plans. _________________________

ANS: T PTS: 1 REF: 147


6. The device shown in the figure above is a security plate. _________________________

ANS: F, locking device

PTS: 1 REF: 148

7. The device shown in the figure above is a locking device. _________________________

ANS: F, security plate

PTS: 1 REF: 148

MULTIPLE CHOICE

1. MTBF is a rating that attempts to measure the time before a(n) ____ failure occurs.
a. hardware c. power
b. software d. operator
ANS: A PTS: 1 REF: 146

2. A power ____ can be caused by a malfunction in the power distribution network.


a. supply c. voltage
b. surge d. error
ANS: B PTS: 1 REF: 146

3. ____ is the term used to describe terrorist acts committed via the Internet.
a. Hacking c. Operator error
b. Cyberterrorism d. LANjacking
ANS: B PTS: 1 REF: 147

4. Which of the following is NOT a method used in a disaster recovery plan?


a. remote offsite backup servers c. botnets
b. surge protectors d. UPSs
ANS: C PTS: 1 REF: 147|149

5. Much better security is offered by ____.


a. WPA2 c. WPA
b. WEP d. GPS
ANS: A PTS: 1 REF: 157

6. A ____ is a program that seems to perform one function, while actually doing something else.
a. malicious program c. macro
b. worm d. Trojan horse
ANS: D PTS: 1 REF: 153

7. A ____ is one term for someone who creates and unleashes malware.
a. cracker c. worm
b. Trojan horse d. bot
ANS: A PTS: 1 REF: 152

8. ____ involves writing specific symbols on walls, sidewalks, or lampposts to signal others they can tap
into a wireless network in the area.
a. War driving c. War chalking
b. LANjacking d. GPS
ANS: C PTS: 1 REF: 156

9. Which of the following is NOT one of the steps a worm makes when infecting a computer system?
a. Slows processing time.
b. Enters the host computer through e-mail.
c. Destroys storage space.
d. Copies itself and attempts to travel to other hosts.
ANS: C PTS: 1 REF: 152

10. A ____ virus infects the system files on your computer causing widespread damage to your hard drive.
a. blended threat c. RAT
b. boot sector d. Trojan horse
ANS: B PTS: 1 REF: 152

11. Which of the following is a common source of viruses?


a. Removable storage media c. Downloaded software
b. Email attachments d. All of the above
ANS: D PTS: 1 REF: 152

12. A ____ usually arrives as an email message containing warnings of a new virus.
a. botmaster c. keylogger
b. virus hoax d. zombie
ANS: B PTS: 1 REF: 154

13. A security suite typically includes ____.


a. antivirus modules c. antispyware modules
b. firewalls d. all of the above
ANS: D PTS: 1 REF: 154

14. Which of the following is NOT true about bots?


a. They cannot be designed for destructive tasks.
b. They can be spread by worms or Trojans.
c. They can perform helpful tasks.
d. They can carry out instructions without the knowledge of the PCs owner.
ANS: A PTS: 1 REF: 153

15. A(n) virus ____ is a section of program code that can be used to identify a known malicious program.
a. fingerprint c. signature
b. ID d. procedure
ANS: C PTS: 1 REF: 155

16. A virus ____ is a file that your antivirus software uses to identify and remove malware.
a. signature c. checksum
b. definition d. patch
ANS: B PTS: 1 REF: 155

17. A ____ is the basis for scrambling and unscrambling the data transmission between wireless devices.
a. firewall c. wireless network key
b. cookie d. wireless node
ANS: C PTS: 1 REF: 157

18. A ____ is a message containing information about a user sent from a Web server to a browser and
stored on the user’s hard drive.
a. Trojan horse c. cookie
b. multi-partite d. stealth
ANS: C PTS: 1 REF: 158

19. A(n) ____ backup contains a copy of every program, data, and system file on a computer.
a. restoration c. differential
b. bootstrap d. full
ANS: D PTS: 1 REF: 160

20. The Windows ____ is a file that stores configuration information about the devices and software
installed on a computer system.
a. root directory c. Registry
b. backup d. Explorer
ANS: C PTS: 1 REF: 160

21. You do not have to click anything to receive a third-party cookie generated by a ____.
a. clear GIF c. Web bug
b. Flash cookie d. A or C
ANS: D PTS: 1 REF: 159

22. A ____ contains your computer’s settings.


a. restore point c. Web-based backup system
b. recovery CD d. Flash cookie
ANS: A PTS: 1 REF: 161

23. When storing your backup files on a LAN, consider each of the following EXCEPT ____:
a. The size of your backup files.
b. Password-protected folders to prevent unauthorized access.
c. That the server is backed up regularly.
d. You should consider all of the above.
ANS: D PTS: 1 REF: 160

24. Backup software is a set of ____ programs designed to back up and restore files.
a. security c. defrag
b. utility d. technique
ANS: B PTS: 1 REF: 161

25. A facility that is designed to house and protect a computer system and its data is called a(n) ____
center.
a. data c. recovery
b. information d. disaster
ANS: A PTS: 1 REF: 146

26. In the figure above, the worm enters the original host and other unprotected hosts using ____.
a. infected files c. e-mail
b. a backdoor d. a packet
ANS: C PTS: 1 REF: 152

27. When referring to war driving and war chalking, war stands for ____.
a. wireless area resources c. wired access resources
b. wireless access revolution d. wireless account resources
ANS: B PTS: 1 REF: 156

28. Item ____ in the figure above indicates an open (available) node.
a. 1
b. 2
c. 3
d. None of the symbols indicate an open node.
ANS: A PTS: 1 REF: 156

29. Item 1 in the figure above indicates ____.


a. an unencrypted network c. an encrypted network
b. an open network d. a low strength signal
ANS: C PTS: 1 REF: 156

30. Item 2 in the figure above indicates ____.


a. an encrypted network c. a closed network
b. an unencrypted network d. None of the above.
ANS: B PTS: 1 REF: 156

31. The device shown in the figure above is a ____ device.


a. restore c. backup
b. registry d. Web
ANS: C PTS: 1 REF: 160

32. Which of the following statements it NOT true about the figure shown above?
a. It is a specially designed lock. c. It is used to prevent theft.
b. It can be attached to a cable. d. It cannot be fastened to a desk.
ANS: D PTS: 1 REF: 148
33. Which of the following statements it NOT true about the figure shown above?
a. It prevents unauthorized data access.
b. It is affixed to the underside of the computer or to a desk.
c. It is used to prevent theft.
d. It anchors your computer to your desk.
ANS: A PTS: 1 REF: 148

34. The device shown in the figure above provides the best protection against power problems.    What is
the name for this device?
a. GPS c. GIS
b. UBS d. UPS
ANS: D PTS: 1 REF: 149

35. Which of the following is NOT an objective of risk management?


a. help reduce downtime c. promote business continuity
b. increase downtime d. maintain good quality service
ANS: B PTS: 1 REF: 146

36. Which of the following is NOT typically included with a data center?
a. fireproof construction c. static floor coverings
b. power generators d. sprinkler systems
ANS: C PTS: 1 REF: 146

37. UPS stands for ____.


a. uninterruptible power source c. uniform power source
b. uninterruptible power supply d. uniform power supply
ANS: B PTS: 1 REF: 149

38. Which of the following is NOT an appliance designed to protect electrical devices from power surges
and voltage spikes?
a. surge suppressor c. surge strip
b. power strip d. surge protector
ANS: B PTS: 1 REF: 149

39. A(n) ____ verifies a user ID and guarantees that you are the person you claim to be.
a. password c. ID
b. protocol d. username
ANS: A PTS: 1 REF: 150

40. Data security on a system that is guarded by user IDs and passwords depends on password ____.
a. protocol c. characteristics
b. secrecy d. rights
ANS: B PTS: 1 REF: 150

41. Authentication protocols that use more than one means of identification are ____ secure than others.
a. less c. equally as
b. more d. not as
ANS: B PTS: 1 REF: 150

42. Malware is created and unleashed by ____.


a. black hats c. crackers
b. cybercriminals d. all of the above
ANS: D PTS: 1 REF: 152

43. A ____ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to
other files on the same computer.
a. computer worm c. Trojan horse
b. mass-mailing worm d. computer virus
ANS: D PTS: 1 REF: 152

44. A RAT is a type of ____.


a. worm c. bot
b. Trojan d. zombie
ANS: B PTS: 1 REF: 153

45. ____ is a type of program that secretly gathers personal information without the victim’s knowledge,
usually for advertising and other commercial purposes.
a. Botmaster c. Antivirus
b. Trojan horse d. Spyware
ANS: D PTS: 1 REF: 153

46. A ____ is a person who controls many bot-infested computers.


a. zombie c. botmaster
b. bot d. botnet
ANS: C PTS: 1 REF: 153

47. A ____ is a computer under the control of a bad bot.


a. botmaster c. clone
b. botnet d. zombie
ANS: D PTS: 1 REF: 153

48. Antivirus software is available for ____.


a. USB flash drives c. personal computers
b. handheld computers d. all of the above
ANS: D PTS: 1 REF: 155

49. ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on
devices that have a valid key.
a. LANjacking c. War chalking
b. Wireless encryption d. War driving
ANS: B PTS: 1 REF: 156

50. A local shared object is also called a(n) ____.


a. Flash cookie c. Web bug
b. ad-serving cookie d. clear GIF
ANS: A PTS: 1 REF: 158

COMPLETION

1. Human error, also called ____________________ error, includes entering inaccurate data or not
following procedures.

ANS:
operator
user

PTS: 1 REF: 147

2. A power ____________________ is a complete loss of power to a computer system.

ANS: failure

PTS: 1 REF: 146

3. ____________________ protocol refers to any method that confirms a person’s identity when using a
computer system.

ANS: Authentication

PTS: 1 REF: 150

4. ____________________ authentication verifies identity using two independent elements of


confirmation.

ANS: Two-factor

PTS: 1 REF: 150

5. A(n) ____________________ is your unique identifier on a computer or Web page.


ANS:

user ID
username
login
handle
screen name
online nickname

PTS: 1 REF: 150

6. Hand-geometry scanners and voice recognition are examples of ____________________ devices.

ANS:
biometric
biometrics

PTS: 1 REF: 150

7. When your personal data is used illegally, it is called ____________________.

ANS: identity theft

PTS: 1 REF: 151

8. A(n) ____________________ attack helps hackers guess your password by stepping through a list of
thousands of the most common passwords.

ANS: dictionary

PTS: 1 REF: 151

9. A password ____________________ is utility software that generates secure passwords and stores
them along with user IDs.

ANS: manager

PTS: 1 REF: 151

10. ____________________ are rules that limit the directories and files that each user can access.

ANS: User rights

PTS: 1 REF: 151

MATCHING

Match the computer crime term with its definition.


a. data diddling f. virus distribution
b. identity theft g. vandalism
c. salami shaving h. blended threat
d. denial of service i. keylogger
e. information theft j. brute force attack
1. Redirecting small, unnoticeable amounts of money from large amounts
2. Intentional defacement of Web sites
3. An attempt to disrupt the operations of a network
4. Malware that combines more than one type of malicious program
5. Unauthorized alterations to data stored on a computer system
6. A type of program that secretly records keystrokes
7. Unauthorized copying of personal information
8. Launching viruses, worms, and Trojan horses
9. A method for stealing user IDs and passwords
10. Unauthorized access to a computer system to gain restricted information

1. ANS: C PTS: 1 REF: 162


2. ANS: G PTS: 1 REF: 162
3. ANS: D PTS: 1 REF: 162
4. ANS: H PTS: 1 REF: 153
5. ANS: A PTS: 1 REF: 162
6. ANS: I PTS: 1 REF: 153
7. ANS: B PTS: 1 REF: 162
8. ANS: F PTS: 1 REF: 162
9. ANS: J PTS: 1 REF: 151
10. ANS: E PTS: 1 REF: 162

ESSAY

1. List five symptoms of a computer infected with malware.

ANS:
Some symptoms include:

• Irritating messages or sounds


• Frequent pop-up ads, at times with pornographic content
• The sudden appearance of a new Internet toolbar
• An addition to your Internet favorites list
• Prolonged system start-up
• Slower than usual response to clicks and keyboard strokes
• Browser or application crashes
• Missing files
• Disabled security software that cannot be restarted
• Periodic network activity when you are not actively browsing or sending email
• The computer reboots frequently

PTS: 1 REF: 154 TOP: Critical Thinking

2. List three ways to prevent your computer from becoming infected by malware.

ANS:
Guidelines, such as the following, can help keep your computer safe:

• Install and activate security software


• Keep software patches and operating system service packs up to date
• Do not open suspicious email attachments
• Obtain software only from reliable sources
• Use security software to scan for malware
• Do not click pop-up ads
• Avoid unsavory Web sites
• Disable the option Hide extensions for known file types in Windows

PTS: 1 REF: 154 TOP: Critical Thinking

3. Describe at least five tips for keeping your computer system in good working condition.

ANS:
•      Regularly clean computer components and peripheral devices
•      Avoid spills into your keyboard
•      Always shut down your PC before cleaning your keyboard
•      Be careful if using a vacuum cleaner to clean your keyboard
•      Use slightly moistened cotton swabs with a mild cleaning fluid to clean sides of keys
•      Wipe the tops of keys with a soft, slightly dampened cloth
•      Allow keyboard to dry before reconnecting it to your PC
•      Regularly use a can of compressed air or a vacuum cleaner hose to clean out debris such as dust
particles, dirt, etc. from the keyboard, vents, and fans
•    Exercise extreme caution when cleaning out the computer’s system case
• Turn off your PC and peripheral devices before cleaning
• Do not touch the system board
• Be careful to not knock any cables loose

PTS: 1 REF: 148 TOP: Critical Thinking

CASE

1. Your coworker, Casey, asks you to explain the differences in a password and a PIN. What would you
tell her?

ANS:
A PIN tends to be a short sequence of numbers that can be entered using a numeric keypad. PINs are
typically used with two-factor authentication protocols.

A password tends to be a longer sequence of letters, numbers, and special characters. Entering a
password usually requires a full qwerty keyboard. Passwords are used in conjunction with single-
factor authentication protocols.

PTS: 1 REF: 151 TOP: Critical Thinking

You have just been hired as an assistant to the network administrator at a local company. You are asked
to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized
activities the network might see if malware enters the company’s network.

2. Explain how a network traffic jam affects a network.

ANS:
A network traffic jam generates traffic on the local area network and the Internet. It causes service to
deteriorate as download time increases for files, Web pages, and email messages.

PTS: 1 REF: 153 TOP: Critical Thinking


3. The servers on the network are flooded with useless traffic. The servers’ processing capabilities are
overwhelmed, and all communications have been stopped. What is probably happening?

ANS:
Denial-of-Service (DoS) attack

PTS: 1 REF: 153 TOP: Critical Thinking

4. Users on the network are blocked from accessing certain Web sites, home page settings are being
changed, and browsers are being redirected to infected Web sites. What is the likely problem?

ANS:
Browser reconfiguration

PTS: 1 REF: 153 TOP: Critical Thinking

5. A coworker contacts you to inspect the computer in her office. She suspects that it is infected with
malware. What steps will you take?

ANS:
1. Immediately use security software to scan the computer.
2. If a virus, worm, Trojan horse, or bot is found in a file or attachment, try to remove the infection.
3. Put the file into quarantine or delete the file.

PTS: 1 REF: 155 TOP: Critical Thinking

You might also like