CSC FInal Exam Questions and Answers
computer forensics - Correct Answers-Using technology to search for computer
evidence of a crime
computer crime - Correct Answers-any illegal act involving a computer
cyber stalking - Correct Answers-a form of harassment that takes place on the internet
identity theft - Correct Answers-the co-option of another person's personal information
(e.g., name, social security number, credit card number, passport) without that person's
knowledge and the fraudulent use of such knowledge
social engineering - Correct Answers-slang for the use of deception to get individuals to
reveal sensitive information
spoofing - Correct Answers-a process used to steal passwords online through deception
malware - Correct Answers-Malicious software that enters a computer system without
the owner's knowledge or consent.
virus - Correct Answers-a software program capable of reproducing itself and usually
capable of causing great harm to files or other programs on the same computer
macro viruses - Correct Answers-attach to data files and take advantage of application
macros
worms - Correct Answers-A program that uses computer host to reproduce itself
Trojan Horse - Correct Answers-A program that performs a useful task while at the
same time carrying out some secret destructive act. A form of software sabotage.
logic bomb - Correct Answers-A program designed to attack in response to a particular
logical event or sequence of events. A type of software sabotage.
time bomb - Correct Answers-a logic bomb that is triggered by a time related event
spy ware - Correct Answers-Technology that collects information from computer users
without their knowledge or consent.
tracking software - Correct Answers-a spyware application program, also called a
spybot, that gathers user information and communicates it to an outsider via the internet
, drive-by downloads - Correct Answers-a spyware download onto your computer that
occurs simply by visiting certain Web sites
antivirus programs - Correct Answers-A type of software designed to search for viruses,
notify users when they are found, and remove them from infected disks or files.
hackers - Correct Answers-Electronic trespassing and vandalism. Also used as slang
for programming.
crackers - Correct Answers-hacker who engages in criminal activity
zombie computers - Correct Answers-An internet connected computer that has been
hijacked using viruses or other tools to perform malicious acts without the knowledge of
their owners and users
computer security - Correct Answers-Protecting computer systems and the information
they contain against unwanted access, damage, modification, or destruction.
smart card - Correct Answers-A card that looks like a standard credit card but features
an embedded microprocessor and memory instead of magnetic strip
biometrics - Correct Answers-measurements of individual body characteristics, such as
a voiceprint or fingerprint
access- control software - Correct Answers-Software that only allows user access
according to the user's needs. Some users can open files that are only related to their
work. Some users are allowed read-only access to files they can see but not change.
system development lifecycle (SDLC) - Correct Answers-A sequence of seven steps or
phases through which an information system passes between the time the system is
conceived and the time it is phased out.
artificial intelligence - Correct Answers-The field of computer science devoted to making
computers perceive, reason, and act in ways that have, until now, been reserved for
human beings.
turing test - Correct Answers-A way to test machine intelligence.
parallel processing - Correct Answers-Using multiple processors to divide jobs into
pieces and work simultaneously on the pieces.
heuristic - Correct Answers-A rule of thumb.
brute force searching - Correct Answers-an exhaustive searching technique where the
computer rapidly repeats a simple operation until the correct answer is found
computer forensics - Correct Answers-Using technology to search for computer
evidence of a crime
computer crime - Correct Answers-any illegal act involving a computer
cyber stalking - Correct Answers-a form of harassment that takes place on the internet
identity theft - Correct Answers-the co-option of another person's personal information
(e.g., name, social security number, credit card number, passport) without that person's
knowledge and the fraudulent use of such knowledge
social engineering - Correct Answers-slang for the use of deception to get individuals to
reveal sensitive information
spoofing - Correct Answers-a process used to steal passwords online through deception
malware - Correct Answers-Malicious software that enters a computer system without
the owner's knowledge or consent.
virus - Correct Answers-a software program capable of reproducing itself and usually
capable of causing great harm to files or other programs on the same computer
macro viruses - Correct Answers-attach to data files and take advantage of application
macros
worms - Correct Answers-A program that uses computer host to reproduce itself
Trojan Horse - Correct Answers-A program that performs a useful task while at the
same time carrying out some secret destructive act. A form of software sabotage.
logic bomb - Correct Answers-A program designed to attack in response to a particular
logical event or sequence of events. A type of software sabotage.
time bomb - Correct Answers-a logic bomb that is triggered by a time related event
spy ware - Correct Answers-Technology that collects information from computer users
without their knowledge or consent.
tracking software - Correct Answers-a spyware application program, also called a
spybot, that gathers user information and communicates it to an outsider via the internet
, drive-by downloads - Correct Answers-a spyware download onto your computer that
occurs simply by visiting certain Web sites
antivirus programs - Correct Answers-A type of software designed to search for viruses,
notify users when they are found, and remove them from infected disks or files.
hackers - Correct Answers-Electronic trespassing and vandalism. Also used as slang
for programming.
crackers - Correct Answers-hacker who engages in criminal activity
zombie computers - Correct Answers-An internet connected computer that has been
hijacked using viruses or other tools to perform malicious acts without the knowledge of
their owners and users
computer security - Correct Answers-Protecting computer systems and the information
they contain against unwanted access, damage, modification, or destruction.
smart card - Correct Answers-A card that looks like a standard credit card but features
an embedded microprocessor and memory instead of magnetic strip
biometrics - Correct Answers-measurements of individual body characteristics, such as
a voiceprint or fingerprint
access- control software - Correct Answers-Software that only allows user access
according to the user's needs. Some users can open files that are only related to their
work. Some users are allowed read-only access to files they can see but not change.
system development lifecycle (SDLC) - Correct Answers-A sequence of seven steps or
phases through which an information system passes between the time the system is
conceived and the time it is phased out.
artificial intelligence - Correct Answers-The field of computer science devoted to making
computers perceive, reason, and act in ways that have, until now, been reserved for
human beings.
turing test - Correct Answers-A way to test machine intelligence.
parallel processing - Correct Answers-Using multiple processors to divide jobs into
pieces and work simultaneously on the pieces.
heuristic - Correct Answers-A rule of thumb.
brute force searching - Correct Answers-an exhaustive searching technique where the
computer rapidly repeats a simple operation until the correct answer is found