CIS 105 Final Exam 4 2023/ 174 Questions
and Answers/ Graded A+
Whose tagline is, "We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us." - -Anonymous
-What is extremely easy to breach? - -An unsecured computer
-What is the key aspect of an Intranet? - -privacy
-What kind of hardware does a firewall use? - -proxy server
-What keeps unauthorized Internet users out of private intranets? - -Firewalls
-Standard security practices dictate a what? - -"Default-deny" Firewall Rules
-Where does the term "virus" come from? - -Biology
-What includes programs specifically intended to penetrate or damage a computer
system? - -Malware
-What malware doesn't need to attach itself to an existing program to spread? - -Worm
-What malware's name originates from Greek mythology? - -Trojan Horse
-What malware is installed covertly on a computer to take control of the system without
the user's knowledge? - -Spyware
-What is the abuse of an email system called? - -Spamming
-What does the acronym "DoS" stand for? - -Denial of Service
, -What is a program that records every keystroke made on a computer? - -Keylogging
-What is the most uncomplicated Internet fraud? - -Purchase Scam
-Which Internet fraud involves using social engineering techniques? - -Phishing
-What can be defined as the ability to keep personal information out of public view? - -
Privacy
-What means that one's personal identity is not known? - -Anonymous
-What is the name of Google's advertising network? - -AdSense
-How does a website know so much about you when you return to it? - -Tracking
Cookie
-What is a list of cached websites on a user's computer called? - -History Files
-What is it called when someone glances at your computer to glean information? - -
Shoulder Surfing
-What does the "S" stand for in SCAM? - -Stingy
-What is it called when criminals sift through trash for information? - -Dumpster
Diving
-What is it called when someone wrongfully uses another person's information? - -
Identity Theft
-Which business behavior would focus on SOX? - -Accounting
and Answers/ Graded A+
Whose tagline is, "We are Anonymous. We are Legion. We do not forgive. We do not
forget. Expect us." - -Anonymous
-What is extremely easy to breach? - -An unsecured computer
-What is the key aspect of an Intranet? - -privacy
-What kind of hardware does a firewall use? - -proxy server
-What keeps unauthorized Internet users out of private intranets? - -Firewalls
-Standard security practices dictate a what? - -"Default-deny" Firewall Rules
-Where does the term "virus" come from? - -Biology
-What includes programs specifically intended to penetrate or damage a computer
system? - -Malware
-What malware doesn't need to attach itself to an existing program to spread? - -Worm
-What malware's name originates from Greek mythology? - -Trojan Horse
-What malware is installed covertly on a computer to take control of the system without
the user's knowledge? - -Spyware
-What is the abuse of an email system called? - -Spamming
-What does the acronym "DoS" stand for? - -Denial of Service
, -What is a program that records every keystroke made on a computer? - -Keylogging
-What is the most uncomplicated Internet fraud? - -Purchase Scam
-Which Internet fraud involves using social engineering techniques? - -Phishing
-What can be defined as the ability to keep personal information out of public view? - -
Privacy
-What means that one's personal identity is not known? - -Anonymous
-What is the name of Google's advertising network? - -AdSense
-How does a website know so much about you when you return to it? - -Tracking
Cookie
-What is a list of cached websites on a user's computer called? - -History Files
-What is it called when someone glances at your computer to glean information? - -
Shoulder Surfing
-What does the "S" stand for in SCAM? - -Stingy
-What is it called when criminals sift through trash for information? - -Dumpster
Diving
-What is it called when someone wrongfully uses another person's information? - -
Identity Theft
-Which business behavior would focus on SOX? - -Accounting