1.
________________ is a kind of denial of service attack in which SYN packets are repeatedly sent to every port on the server using fake IP addresses.
Correct Answer
C. Syn flooding
Explanation
Syn flooding is a type of denial of service attack where SYN packets are continuously sent to every port on the server using fake IP addresses. This overwhelms the server's resources and prevents it from responding to legitimate requests, causing a denial of service for legitimate users. This attack takes advantage of the TCP handshake process, where the attacker sends numerous SYN packets but never completes the handshake, tying up server resources and rendering it inaccessible to others.
2.
Only a small minority of U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files.
Correct Answer
A. True
Explanation
The statement is True. While there may be some employers who observe employee phone calls, emails, web browsing habits, and computer files, it is only a small minority of them. This means that the majority of U.S. employers do not engage in such monitoring practices. However, it’s important to note that under federal law, employers may monitor employee conversations if the monitoring occurs in the ordinary course of business or if there is employee consent.
3.
Computer crimes and cyber crimes are the same type of crimes.
Correct Answer
B. False
Explanation
Computer crimes and cyber crimes are not the same type of crimes. While they are related, they have distinct differences. Computer crimes refer to illegal activities that involve the use of a computer as a tool or target, such as hacking, unauthorized access, or data theft. On the other hand, cyber crimes encompass a broader range of criminal activities that occur in the digital realm, including computer crimes but also online fraud, identity theft, phishing, and more. Therefore, it is incorrect to consider them as the same type of crimes.
4.
In data dibbling, a criminal obtains personal information to impersonate you.
Correct Answer
B. False
Explanation
In data dibbling, a criminal does not obtain personal information to impersonate you. This statement implies that data dibbling involves obtaining personal information for the purpose of impersonation, which is incorrect. Data dibbling refers to the unauthorized access or manipulation of data, but it does not necessarily involve identity theft or impersonation.
5.
Technologies that jeopardize anonymity
Correct Answer(s)
A. Cookies
C. GUIDs
D. Radio Frequency Identification
Explanation
The technologies mentioned in the answer, namely cookies, GUIDs, and Radio Frequency Identification (RFID), can jeopardize anonymity. Cookies are small text files stored on a user's computer that track their online activities, potentially revealing personal information. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users, making it easier to track their actions. RFID uses radio waves to identify and track objects or individuals, compromising anonymity if used without proper safeguards. Bluetooth, which is not mentioned in the answer, is a wireless technology for short-range communication and does not directly jeopardize anonymity.
6.
To protect one's privacy online, individuals should
Correct Answer(s)
A. Use software that protects anonymity, such as Anonymous Surfing
C. Use throwaway email addresses.
D. Turn off cookies
Explanation
To protect one's privacy online, individuals should use software that protects anonymity, such as Anonymous Surfing. This software helps to hide the user's IP address and encrypt their internet connection, making it difficult for others to track their online activities. Additionally, using throwaway email addresses can prevent personal information from being linked to a permanent email account. Turning off cookies can also enhance privacy as it prevents websites from tracking and storing user information. By following these practices, individuals can minimize the risk of their personal information being compromised online.
7.
IP ____________ sends a message with an IP address disguised as a message from a trusted source.
Correct Answer
C. Spoofing
Explanation
Spoofing is the correct answer because it involves sending a message with an IP address disguised as a message from a trusted source. This technique is commonly used by hackers to deceive recipients into thinking that the message is coming from a legitimate source, allowing them to gain unauthorized access or extract sensitive information. Spoofing can be done through various protocols, such as IP spoofing, email spoofing, or caller ID spoofing.
8.
_______________ is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
Correct Answer
D. Honeypot
Explanation
A honeypot is a trap set to detect, deflect, or counteract attempts at unauthorized use of information systems. It is designed to attract and deceive potential attackers, making them believe they have found a vulnerable target. By luring hackers or cybergangs into the honeypot, organizations can gather information about their tactics, techniques, and intentions, and use this knowledge to enhance their security measures. Honeypots can also be used to divert attackers' attention away from real systems and protect sensitive data from being compromised.
9.
The act of secretly removing RAM chips from office computers and selling them
Correct Answer
B. Memory shaving
Explanation
Memory shaving refers to the act of secretly removing RAM chips from office computers and selling them. This is a form of theft as it involves unlawfully taking and selling someone else's property. It is different from software piracy, which involves the unauthorized copying and distribution of software, and salami slicing, which refers to a financial crime that involves stealing small amounts of money from many different accounts.
10.
Alexa protects her privacy at school by never giving out her login password and by having Safari save her login password to her Gmail account.
Correct Answer
B. False
Explanation
The statement is false because saving login passwords to a Gmail account does not protect privacy at school. Sharing login passwords or storing them in an email account can compromise privacy and security. It is important to keep login credentials confidential and not share them with others.
11.
To ensure one's privacy at work, refrain from making personal calls on a work phone and avoid using company email for personal purposes.
Correct Answer
A. True
Explanation
The statement suggests that in order to maintain privacy at work, it is important to avoid making personal calls on a work phone and using company email for personal purposes. This is because using work resources for personal matters can potentially compromise privacy and blur the boundaries between personal and professional life. Therefore, the answer "True" indicates that the statement is correct.
12.
The following is an example of ______________. A cashier at a restaurant steals $0.05 from every bill she processes.
Correct Answer
A. Salami slicing
Explanation
The given scenario is an example of "salami slicing." Salami slicing refers to a method of stealing small amounts of money or data over a long period of time, with the hope that the theft will go unnoticed. In this case, the cashier steals $0.05 from each bill, which may seem insignificant individually but can accumulate to a substantial amount over time. This method allows the thief to avoid suspicion as the theft is spread out and not easily noticeable.
13.
An area of law dedicated to computer crime
Correct Answer
A. Cyberlaw
Explanation
Cyberlaw refers to the area of law that deals with legal issues related to computer crimes. It encompasses various aspects such as hacking, online fraud, identity theft, and illegal activities conducted on the internet. Cyberlaw aims to establish guidelines and regulations to prevent and prosecute cybercrimes, as well as protect individuals and organizations from digital threats. It also addresses issues such as online privacy, intellectual property rights, and electronic transactions. Therefore, cyberlaw is the correct answer as it specifically focuses on the legal framework surrounding computer crimes.
14.
Maleek used several fake e-mails and social engineering to trick several coworkers into giving him their personal information. This is an example.
Correct Answer
D. Spear pHishing
Explanation
Spear phishing is the correct answer because Maleek used fake emails and social engineering techniques to specifically target and trick his coworkers into revealing their personal information. Unlike regular phishing attacks that cast a wide net, spear phishing involves personalized and targeted attacks, making it more effective in obtaining sensitive information.
15.
The following is an example of ______________. Bromley opened an email that he thought was from his friend, but the email contained spyware, and it obtained all of his banking account information.
Correct Answer
B. pHishing attacks
Explanation
The given scenario is an example of phishing attacks. Phishing attacks involve sending deceptive emails or messages that appear to be from a trusted source, such as a friend or a legitimate organization, with the intention of tricking the recipient into revealing sensitive information or downloading malicious software. In this case, Bromley opened an email that he believed was from his friend, but it turned out to be a phishing attempt that resulted in the installation of spyware and the theft of his banking account information.
16.
The following is an example of ______________. Katherine often goes through her employers' garage cans and locates discarded files of their clients, and opens credit card accounts in their names.
Correct Answer(s)
A. Identify theft
C. Dumpster diving
Explanation
The given scenario describes dumpster diving, which is the act of searching through trash or discarded items to find valuable or sensitive information. In this case, Katherine is going through her employers' garbage cans to find discarded files of their clients and using that information to open credit card accounts in their names. This is a clear example of identity theft, as she is using someone else's personal information without their consent for fraudulent purposes.
17.
Legislation currently in place in the United States to protect consumers from the computer and cyber crimes includes the
Correct Answer(s)
B. Health Insurance Portability and Privacy Act
D. Family Education Rights and Privacy Act
Explanation
The Health Insurance Portability and Privacy Act (HIPAA) is a legislation in the United States that protects consumers' health information and ensures its privacy. It establishes national standards for the security and confidentiality of individuals' medical records and other personal health information. The Family Education Rights and Privacy Act (FERPA) is another legislation that protects the privacy of students' education records. It gives parents certain rights with respect to their children's education records, such as the right to access and amend the records. Both acts play a crucial role in safeguarding consumers' personal information and protecting them from computer and cyber crimes.
18.
To protect your privacy online, fill out forms only when the website displays
Correct Answer
D. Https:
Explanation
The correct answer is "https:" because the "https:" protocol is used for secure communication over a computer network. When a website displays "https:" in its URL, it means that the data transmitted between the user's browser and the website is encrypted and secure from potential eavesdropping or tampering. This ensures the privacy and protection of personal information entered into forms on the website.
19.
These rogue programs remain dormant until triggered or activated.
Correct Answer(s)
C. Time bomb
D. Logic bomb
Explanation
The given statement describes rogue programs that stay inactive until a specific event or condition occurs, at which point they become active and carry out their intended actions. This behavior is characteristic of both time bombs and logic bombs. Time bombs are programmed to activate at a specific date or time, while logic bombs are triggered by a specific logical condition being met. Therefore, both time bombs and logic bombs fit the description provided in the statement.
20.
______ are unsolicited messages sent via a cell phone or instant messaging service.
Correct Answer
D. Spim
Explanation
Spim refers to unsolicited messages sent via a cell phone or instant messaging service. It is similar to spam emails but specifically targets mobile devices and messaging apps. Unlike viruses or spyware, spim does not aim to infect or harm devices but rather to annoy or deceive users with unwanted messages.
21.
Cookies cannot be disabled.
Correct Answer
B. False
Explanation
This statement is false because cookies can indeed be disabled. Cookies are small text files stored on a user's device that track their activity on a website. Users have the option to disable cookies in their web browser settings, which prevents websites from storing or accessing cookies on their device. Disabling cookies can help enhance privacy and security by preventing tracking and targeted advertising. Therefore, the correct answer is false.
22.
An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information
Correct Answer
D. Privacy
Explanation
Privacy refers to an individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information. It is an important aspect of ethics and protection, as it ensures that individuals have control over their personal data and can maintain their anonymity. Privacy allows individuals to determine who has access to their personal information and how it is used, thereby safeguarding their confidentiality and ensuring their personal autonomy.
23.
A global unique identifier is an identification number produced by software or a piece of hardware.
Correct Answer
A. True
Explanation
A global unique identifier, often abbreviated as GUID, is indeed an identification number that is generated by software or hardware. This identifier is globally unique, meaning it is highly improbable for two different entities to have the same GUID. It is commonly used in various computer systems and databases to uniquely identify objects, records, or entities.
24.
Examples of ubiquitous computing include the use of
Correct Answer(s)
A. Active badges
C. SmartpHones
Explanation
Ubiquitous computing refers to the concept of seamlessly integrating technology into our everyday lives. Active badges and smartphones are both examples of this, as they are devices that are constantly present and used by individuals. Active badges are wearable devices that track a person's location and provide information about their activities, while smartphones are handheld devices that have become essential for communication, internet access, and various other tasks. Both of these examples demonstrate how technology has become pervasive and integrated into our daily routines.
25.
Viruses can spread via
Correct Answer(s)
A. Email attachments
B. Flash drives
C. Downloading software
Explanation
Viruses can spread through various means, including email attachments, flash drives, and downloading software. Email attachments can contain infected files that, when opened, can infect the recipient's computer. Flash drives can carry viruses that can be transferred to other devices when connected. Downloading software from untrusted sources can also lead to virus infections, as the software may contain malware. Therefore, it is important to exercise caution when dealing with email attachments, flash drives, and downloading software to prevent the spread of viruses.
26.
RFID are used by used by stores to control ___________ and to identify lost ___________and gather information about individuals from their _________
Correct Answer(s)
A. Inventory
C. Passports
D. Pets
Explanation
RFID technology is utilized by stores to manage their inventory efficiently. By tagging products with RFID tags, stores can track and control their stock levels more accurately. Additionally, RFID tags are also used to identify lost passports, enabling authorities to locate and return them to their owners. Similarly, RFID tags are employed to identify and track pets, ensuring their safety and aiding in reuniting them with their owners. The technology can also be used to gather information about individuals through their passports, providing valuable insights for various purposes.
27.
Types of rogue programs include
Correct Answer(s)
B. Time bombs
C. Worms
D. Keyloggers
Explanation
The given answer is a list of types of rogue programs. Rogue programs are malicious software that can cause harm to a computer system. Time bombs are programs that are designed to activate or cause damage at a specific time or date. Worms are self-replicating programs that spread across networks and can cause damage. Keyloggers are programs that record keystrokes, allowing attackers to capture sensitive information such as passwords. Therefore, the correct answer includes time bombs, worms, and keyloggers as types of rogue programs.
28.
Adware is a form of spyware that generates annoying pop-up and banner ads.
Correct Answer
A. True
Explanation
Adware is a type of software that displays unwanted advertisements, usually in the form of pop-up windows or banners. It is considered a form of spyware because it collects information about the user's browsing habits and interests in order to display targeted ads. These ads can be disruptive and intrusive, often appearing without the user's consent. Therefore, the statement that adware generates annoying pop-up and banner ads is true.
29.
_______ are transparent graphic images placed on a Web site or in an e-mail used to monitor Web or e-mail behavior
Correct Answer
A. Beacons
Explanation
Beacons are transparent graphic images that are placed on a website or in an email to monitor web or email behavior. They are often used by marketers to track user interactions, such as opening an email or visiting a specific webpage. Beacons allow companies to gather data on user behavior, such as the number of times an email is opened or the pages visited on a website. This information can then be used to analyze user engagement and tailor marketing strategies accordingly.
30.
Passwords should consist of _______________
Correct Answer(s)
A. Lowercase letters
B. Numbers
C. Uppercase letters
E. Special characters
Explanation
Passwords should consist of a combination of lowercase letters, numbers, uppercase letters, and special characters. This combination helps to enhance the complexity and strength of the password, making it more difficult for hackers to guess or crack. Including a variety of character types increases the number of possible combinations, making the password more secure. Using personal information such as pets' names or names of people close to you can make the password easier to guess, so it is generally recommended to avoid using such information in passwords.
31.
_________________ activities committed using the Internet that violate state, federal, or international laws.
Correct Answer
B. Cybercime
Explanation
Cybercrime refers to illegal activities conducted using the Internet that violate state, federal, or international laws. This can include hacking, online fraud, identity theft, spreading malware, and other malicious activities. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, or cause financial harm. The term "cybercrime" encompasses a wide range of illegal activities committed in the digital realm, highlighting the growing need for cybersecurity measures to protect individuals, organizations, and governments from these threats.
32.
To avoid having to remember your passwords and account numbers, always save them on your computer.
Correct Answer
B. False
Explanation
Saving passwords and account numbers on a computer is not a secure practice. It increases the risk of unauthorized access to sensitive information. Storing passwords and account numbers on a computer can make them vulnerable to hacking, malware, or theft. It is recommended to use secure password managers or other offline methods to store and manage passwords and account numbers.