// // // // //
8) Questions With Answers
// // //
Digital /
/security /
/risk //- /
/CORRECT /
/ANSWERS(S)✔✔Any /
/event /
/or /
/action /
/that /
/could /
/cause //
a/
/loss /
/of /
/or /
/damage /
/to //
a/
/computer /
/or //mobile //device //hardware, //software, //data, //information, //or //processing //capability.
Computer /
/crime //- /
/CORRECT /
/ANSWERS(S)✔✔Any //illegal //act //involving //the //use //of //a //computer //or //related //devices.
Cybercrime //- //CORRECT //ANSWERS(S)✔✔An //online //or //Internet-based //illegal //act.
,Malware //- /
/CORRECT /
/ANSWERS(S)✔✔(Malicious /
/software) /
/consists /
/of /
/programs /
/that //act //without //a //user's //knowledge //and //deliberately //alter //the //operations //of //computers
//and //mobile //devices.
Information /
/transmitted /
/over /
/networks /
/has //
a/
/higher /
/degree /
/of /
/security /
/risk /
/than /
/information /
/kept //on //an //organization's //premises. //True //or //False? //- //CORRECT //ANSWERS(S)✔✔True.
Botnet //- /
/CORRECT /
/ANSWERS(S)✔✔A /
/group //of //compromised //computers //or //mobile //devices //connected //to //a //network.
Denial /
/of /
/service /
/attack //- /
/CORRECT //ANSWERS(S)✔✔(DoS //attack) //disrupts //computer //access //to //an //Internet //service.
,Back /
/door //- /
/CORRECT /
/ANSWERS(S)✔✔A /
/program /
/or //set //of //instructions //in //a //program //that //allow //users //to //bypass //security //controls.
Spoofing //- /
/CORRECT /
/ANSWERS(S)✔✔A /
/technique /
/intruders //use //to //make //their //network //or //Internet //transmission //appear //legitimate.
Safeguards /
/against /
/Internet /
/Attacks //- /
/CORRECT /
/ANSWERS(S)✔✔Use /
/antivirus /
/software, /
/be //suspicious //of //unsolicited //email //attachments, //scan //removal //media //for //malware //before
//using //it, //implement //a //firewall, //and //backup //your //PC/mobile //device //regularly.
Firewall //- /
/CORRECT /
/ANSWERS(S)✔✔Hardware /
/and/or //software //that //protects //a //network's //resources //from //intrusion.
Honeypot //- /
/CORRECT /
/ANSWERS(S)✔✔Vulnerable /
/computer //that //is //set //up //to //entice //an //intruder //to //break //into //it.
, Unauthorized /
/access //- /
/CORRECT //ANSWERS(S)✔✔The //use //of //a //computer //or //network //without //permission.
Unauthorized /
/use //- /
/CORRECT //ANSWERS(S)✔✔The //use //of //a //computer //or //its //data //for //unapproved //or //possibly
//illegal //activities.
PIN //- /
/CORRECT //ANSWERS(S)✔✔(personal //identification //number), //sometimes //called //a //passcode,
//is //a //numeric //password, //either //assigned //by //a //company //or //selected //by //a //user.
Biometric /
/device //- /
/CORRECT /
/ANSWERS(S)✔✔Authenticates //
a/
/person's /
/identity /
/by /
/translating //
a/
/personal /
/characteristic //into //a //digital //code //that //is //compared //with //a //digital //code //in //a //computer //or
//mobile //device //verifying //a //physical //or //behavioral //characteristic.
Two-
step /
/verification //- /
/CORRECT /
/ANSWERS(S)✔✔Uses /
/two //separate //methods, //one //after //the //next, //to //verify //the //identity //of //a //user.