DOC PREVIEW
UNT BCIS 2610 - Exam3 Study guide

This preview shows page 1-2-3-4 out of 13 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

REMINDER OF EXAM POLICIESEXAM ADMINISTRATIONMORLEY CHAPTER 4: Network and Internet SecurityKEY TERMS include … (page number of definition inside parentheses)MORLEY CHAPTER 5: Computer Security and PrivacyKEY TERMS include … (page number of definition inside parentheses)MORLEY CHAPTER 8: Emerging TechnologiesKEY TERMS include … (page number of definition inside parentheses)MICROSOFT POWERPOINT 2016MODULE 1: Creating a PresentationREVIEW QUESTIONS --MODULE 1 KEY TERMS include …MODULE 2: Adding Media and Special EffectsREVIEW QUESTIONS --MODULE 2 KEY TERMS include …MODULE 3: unassigned for regular sections1 BCIS 2610 -- EXAM 3 STUDY GUIDE Exam Time: When your section meets (the exam duration is 50 minutes). Exam Location: Where your section normally meets. REMINDER OF EXAM POLICIES 1. You must take the exam with your section; otherwise your grade will be zero. 2. You must present your Student ID card, or other acceptable picture ID, when turning in the exam. 3. Closed books, closed notes 4. No electronic devices. Cell phones must be switched off. EXAM ADMINISTRATION • We do not supply you with pencils. Bring two sharpened No. 2 pencils, and a good eraser that does not leave smudges. • We will supply the machine-readable sheet(s) for you to use, as well as a numbered exam. • Follow the instructions provided by your section’s instructor. MATERIAL TO BE COVERED ON THIS EXAM *** (This is an NOT an exhaustive list of topics, but paying more attention on these areas will help you focus your exam preparation effort.)*** MORLEY CHAPTER 4: Network and Internet Security 1. Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called ____. (Answer: c) a. hacking b. online auction fraud c. phishing d. None of the above 2. True or False: Most spyware is installed on a PC without the user’s knowledge. (Answer: True) 3. Using someone else’s identity to purchase goods or services or perform other transactions is called ____. (Answer: identity theft) 4. You can find out if someone else has signed up for a credit card in your name by viewing your ____. (Answer: c) a. digital certificate b. antispyware results c. credit report d. all of the above 5. True or False: A digital signature is used to encrypt the contents of an email message so it cannot be understood if intercepted. (Answer: False)2 6. Digital certificates are obtained from a(n) ____. (Answer: Certificate Authority) 7. Repeated threats or other harassment carried out online is referred to as ____. (Answer: a) a. cyberstalking b. online pornography c. identity theft d. only a and c are correct answers 8. True or False: Cyberstalkers often find their victims online. (Answer: True) 9. Bullying an individual online is typically referred to as ____. (Answer: cyberbullying) 10. Which of the following is not a common-sense precaution against cyberstalking? (Answer: c) a. Requesting your personal information to be removed from online directories. b. Not revealing your true name and contact information in chat rooms. c. Monitoring your credit report. d. None of the above 11. True or False: “Bikinigirl” would be a good name to avoid attracting unwanted attention in a chat room. (Answer: False) 12. ____ occurs when someone sees a teen’s explicit photo in a text message or on the Internet and threatens to expose the teen’s behavior unless the teen sends more explicit photos. (Answer: Sextortion) 13. Which of the following laws refers to protecting health information stored electronically? (Answer: a) a. HIPAA b. USAPA c. FACTA d. CODIS 14. True or False: It is virtually impossible to create laws that cover network and Internet security issues today. (Answer: False) 15. The ____ Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data. (Answer: SarbanesOxley) KEY TERMS include … (page number of definition inside parentheses) - - - - - Antivirus software (165) Biometric access system (150) Bot (160) Botnet (160) Computer crime (143) - - - - Password (148) Pharming (171) Phishing (169) Possessed knowledge access system (148)3 - - - - - - - - - - - - - - - - Computer sabotage (160) Computer virus (161) Computer worm (161) Cyberbullying (177) Cyberstalking (177) Denial of service attack (DoS) (163) Digital certificate (175) Digital ID (175) Digital signature (176) Dot con (166) Encryption (154) Firewall (152) Hacking (144) Identity theft (168) Malware (160) Online auction fraud (172) - - - - - - - - - - - - - - Possessed object access system (149) Private key encryption (155) Public key encryption (155) Secure Web page (154) Security software (165) Social media hack (171) Spear phishing (170) Trojan horse (161) Two-factor authentication (149) Unauthorized access (144) Unauthorized use (144) Virtual private network (VPN) (156) War driving (146) Wi-Fi piggybacking (146) MORLEY CHAPTER 5: Computer Security and Privacy 1. Which of the following is not a possible computer security concern? (Answer: c) a. Having your PC stolen b. Losing your mobile phone c. Sending a non-sensitive file via e-mail d. Reading barcodes at the market 2. True or False: All individuals should be concerned about security issues surrounding computers and related technology. (Answer: True) 3. Safeguarding a PC against theft and backing up files so that you do not lose important documents are all computer _____ concerns. (Answer: security) 4. Which of the following would not likely be a reason for stealing a notebook PC? (Answer: b) a. For the data contained on the PC b. To use in a denial of service (DoS) attack c. For the value of the hardware d. Non eof the above 5. True or False: It is only important to use a surge suppressor during bad weather, when a lightning strike may occur. (Answer: False) 6. A copy of a file that is created in case the original is damaged is called a(n) ____. (Answer: backup)4 7. Using a computer to make illegal copies of currency to circulate as real currency is a form of ____. (Answer: c) a. software piracy b. computer sabotage c. digital counterfeiting d. DMCA 8. True or False: Software piracy is rarely performed today. (Answer: False) 9. ____ is the unauthorized copying of a computer program. (Answer:


View Full Document

UNT BCIS 2610 - Exam3 Study guide

Documents in this Course
Load more
Download Exam3 Study guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam3 Study guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam3 Study guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?