DOC PREVIEW
UNT BCIS 2610 - Exam3 Study guide

This preview shows page 1-2-3-4 out of 13 pages.

Save
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

BCIS 2610 EXAM 3 STUDY GUIDE Exam Time When your section meets the exam duration is 50 minutes Exam Location Where your section normally meets REMINDER OF EXAM POLICIES 1 You must take the exam with your section otherwise your grade will be zero 2 You must present your Student ID card or other acceptable picture ID when turning in the exam 3 Closed books closed notes 4 No electronic devices Cell phones must be switched off EXAM ADMINISTRATION We do not supply you with pencils Bring two sharpened No 2 pencils and a good eraser that does not leave smudges We will supply the machine readable sheet s for you to use as well as a numbered exam Follow the instructions provided by your section s instructor MATERIAL TO BE COVERED ON THIS EXAM This is an NOT an exhaustive list of topics but paying more attention on these areas will help you focus your exam preparation effort MORLEY CHAPTER 4 Network and Internet Security 1 2 3 4 5 Sending an e mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called Answer c a hacking b online auction fraud c phishing d None of the above True or False Most spyware is installed on a PC without the user s knowledge Answer True Using someone else s identity to purchase goods or services or perform other transactions is called Answer identity theft You can find out if someone else has signed up for a credit card in your name by viewing your Answer c a digital certificate b antispyware results c credit report d all of the above True or False A digital signature is used to encrypt the contents of an email message so it cannot be understood if intercepted Answer False 1 6 7 8 10 11 12 13 14 15 Digital certificates are obtained from a n Answer Certificate Authority Repeated threats or other harassment carried out online is referred to as Answer a a cyberstalking b online pornography c identity theft d only a and c are correct answers True or False Cyberstalkers often find their victims online Answer True 9 Bullying an individual online is typically referred to as Answer cyberbullying Which of the following is not a common sense precaution against cyberstalking Answer c a Requesting your personal information to be removed from online directories b Not revealing your true name and contact information in chat rooms c Monitoring your credit report d None of the above True or False Bikinigirl would be a good name to avoid attracting unwanted attention in a chat room Answer False occurs when someone sees a teen s explicit photo in a text message or on the Internet and threatens to expose the teen s behavior unless the teen sends more explicit photos Answer Sextortion Which of the following laws refers to protecting health information stored electronically Answer a a HIPAA b USAPA c FACTA d CODIS True or False It is virtually impossible to create laws that cover network and Internet security issues today Answer False The Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data Answer SarbanesOxley KEY TERMS include page number of definition inside parentheses Antivirus software 165 Biometric access system 150 Bot 160 Botnet 160 Computer crime 143 Password 148 Pharming 171 Phishing 169 Possessed knowledge access system 148 2 Computer sabotage 160 Computer virus 161 Computer worm 161 Cyberbullying 177 Cyberstalking 177 Denial of service attack DoS 163 Digital certificate 175 Digital ID 175 Digital signature 176 Dot con 166 Encryption 154 Firewall 152 Hacking 144 Identity theft 168 Malware 160 Online auction fraud 172 Possessed object access system 149 Private key encryption 155 Public key encryption 155 Secure Web page 154 Security software 165 Social media hack 171 Spear phishing 170 Trojan horse 161 Two factor authentication 149 Unauthorized access 144 Unauthorized use 144 Virtual private network VPN 156 War driving 146 Wi Fi piggybacking 146 MORLEY CHAPTER 5 Computer Security and Privacy 1 2 3 4 5 6 Which of the following is not a possible computer security concern Answer c a Having your PC stolen b Losing your mobile phone c Sending a non sensitive file via e mail d Reading barcodes at the market True or False All individuals should be concerned about security issues surrounding computers and related technology Answer True Safeguarding a PC against theft and backing up files so that you do not lose important documents are all computer concerns Answer security Which of the following would not likely be a reason for stealing a notebook PC Answer b a For the data contained on the PC b To use in a denial of service DoS attack c For the value of the hardware d Non eof the above True or False It is only important to use a surge suppressor during bad weather when a lightning strike may occur Answer False A copy of a file that is created in case the original is damaged is called a n Answer backup 3 7 8 9 10 11 12 13 14 15 16 17 18 19 Using a computer to make illegal copies of currency to circulate as real currency is a form of Answer c a software piracy b computer sabotage c digital counterfeiting d DMCA True or False Software piracy is rarely performed today Answer False is the unauthorized copying of a computer program Answer Software piracy Which of the following is a possible result of a data breach Answer c a Damaged corporate reputation b Expense of notifying the individuals involved c Both a and b are possible ramifications d None of the above is a correct answer True or False The problem of protecting personal privacy and keeping personal information private did not exist before computers and the Internet Answer False The term refers to the rights of individuals and companies to control how information about them is collected and used Answer information privacy A document that discloses how your personal information will be used is called a n Answer a a privacy policy b opt out c throw away e mail address d freedom of information act document True or False An e mail filter can be used to block access to Web pages that the user may find objectionable Answer False Unsolicited instant messages are called Answer spim A device that an employee wears so the location of that employee can be monitored on a continual basis is called a n Answer c a computer monitoring program b magnetic stripe card c proximity card d RFID collar True or False Video surveillance in public locations is very common Answer True The ability of one computing device on a network to locate and


View Full Document

UNT BCIS 2610 - Exam3 Study guide

Documents in this Course
Load more
Download Exam3 Study guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam3 Study guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam3 Study guide and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?