What term is used to describe the discovery collection and analysis of evidence found on computers and networks?

Which of the following statements is not true about software theft?

A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.

Which of the following statements is not true about intellectual property rights?

The term fair use refers to the rights which creators are entitled for their work.

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

Which of the following is the process of restricting access to certain material on the web?

In order to safeguard your personal information, which of the following is recommended?

Clear your history file when you are finished browsing.

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

Audit trails only record unsuccessful access attempts.

Into which of the following kinds of ports do external fingerprint readers plug?

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

Secure sites typically use digital certificates along with security protocols.

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

Which of the following does your company use to track your time and attendance?

If a company does not have a formal email policy, it can read email messages without employee notification.

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

Any device that connects to the Internet is susceptible to mobile malware.

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

What is the term for a website that uses encryption techniques to protect its data?

Analog signatures help to prevent email forgery.

To remove spyware, users need to obtain a special program that can detect and delete it.

Social engineering, as it pertains to computers, is _____________.

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

Combating cybercrime is not one of the FBI's top priorities.

Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?

Which of the following can be used to create a software registration number, sometimes illegally?

What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?

a group of compromised computers or mobile devices connected to a network

A botnet composed computer or device is known as a ________

_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services

denial of service attack (DoS attack)

a program or set of instructions in a program that allow users to bypass security controls

a technique intrudes use to make their network or Internet transmission appear legitimate

hardware and/or software that protects a network resources form intrusion

What is the difference between unauthorized access and unauthorized use?

unauthorized access- the use of a computer or network without permission

unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities

To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection

a security measure that defines who can access a computer, device, or network

(1) who can access a computer
(2) when they can access it
(3) what actions can be taken while accessing it

a unique combination of characters that identifies one specific user

a private combination of characters associated with the user name that allows access to certain computer resources

A ___________ ________ is any item that you can, to gain access to a computer or computer facility

A posessed object can often be used in combination with a ____ (_________ ____________ _________)

PIN (personal identification number)

authenticates a person's identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer

the discovery, collection, and analysis of evidence found on computers and networks

Software theft occurs when resources:

(1) steals software media
(2) inetionally erases programs
(3) illegally registers and/or activites a program
(4) illegally copies a program

A single-user license agreement typically contains the followign conditions:
You can:

(1) install the software on only one computer
(2) make one copy of the software as a backup
(3) give or sell the software to another individual, but only if the software is removed from the user's computer first

A single-user license agreement typically contains the followign conditions:
You cannot:

(1) install the software on a network's software
(2) export the software
(3) rent or lease the software
(4) give copies to friends and colleagues, while continuing software

What are the common types of malware?

(1) virus
(2) worm
(3) trojan horse
(4) rootkit
(5) spyware
(6) adware

Which type of malware is this:
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission

Which type of malware is this:
a program that copies itself repeatedly, using up resources and possibly shurring down the computer, device, or network

Which type of malware is this:
a program that hides within or looks like a legitimate program.

Which type of malware is this:
a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

Which type of malware is this:
a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source whiel the user is online

Which type of malware is this:
a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services

True or False: A trojan horse can replicate itself

False; unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices

occurs when someone steals personal or confidential information

a process of converting data that is readable by humans into encoded characters to prevent unauthorized access

a notice that guarantees a user or a website is legitimate

a website that uses encryption techniques to secure its data is known as a _______ _____

What is the difference of hardware theft and hardware vandalism?

Hardware theft- the act of stealing digital equipment

Hardware vandalism- the act of defacing or destroying digital equipment

To help reduce the chance of theft, companies and schools use a variety of ________ __________

List hardware theft and vandalism safeguards.

(1) physical access controls
(2) alarm system
(3) physical security devices
(4) device-tracking app

List hardware failured safeguards.

(1) surge protector
(2) uninterruptible power supply (UPS)
(3) duplicate components or duplicate computers
(4) fault-tolerant computer

Which of the following is the discovery collection and analysis of evidence found on computers and networks?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

What general term refers to the use of computers computer networks or the Internet?

Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data and information. IT is typically used within the context of business operations as opposed to personal or entertainment technologies. IT forms part of information and communications technology (ICT).

What is meant by computer forensics?

Computer forensics is a field of technology that uses investigative techniques to identify and store evidence from a computer device. Often, computer forensics is used to uncover evidence that could be used in a court of law. Computer forensics also encompasses areas outside of investigations.

What are the types of computer forensic?

Different types of Digital Forensics are Disk Forensics, Network Forensics, Wireless Forensics, Database Forensics, Malware Forensics, Email Forensics, Memory Forensics, etc.