Assignment 2
Assignment 2
2. _____, which are generated by Web server software, record a user’s actions on a Web site.
a. Viruses
b. Log files
c. Junk e-mails
d. Worms
7. A _____ is a collection of binary digits, including message data and control characters for
formatting and transmitting, sent from computer to computer over a network.
a.
bandwidth
b. protocol
c. packet
d. topology
8. To minimize the invasion of privacy, users and organizations should:
a. use verification procedures to ensure data accuracy.
b. provide wrong data to unauthorized users.
c. keep collected information even after the stated purpose is over.
d. provide access to one’s personal information to all interested parties.
9. In the context of computer crimes and attacks, the difference between phishing and spear
phishing is that:
a. in spear phishing, the attack is targeted toward a specific person or a group.
b. spear phishing involves collecting sensitive information via phone calls.
c. in spear phishing, hackers capture and record network traffic.
d. spear phishing involves monitoring and recording keystrokes.
11. Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI)
model.
a. Physical layer
b. Network layer
c. Transport layer
d. Data Link layer
12. _____ are small text files with unique ID tags that are embedded in a Web browser and
saved on the user’s hard drive.
a. Kernels
b. Applets
c. Cookies
d. Firewalls
13. Social engineering is an attack that takes advantage of the backdoors in security
systems.
Select one:
True
False
14. The main function of Cyber Incident Response Capability (CIRC) is to _____.
a. create backdoors to bypass security protocols
b. restrict access controls to unauthorized personnel
c. provide level 1 security
d. provide information on security incidents
15. The process of deciding which path that data takes is called routing
16. Which is included in the goal of the Health Insurance Portability and Accountability Act
(HIPAA)?
a. Safeguarding conversations between patients and their families
b. Protecting patients’ credit information
c. Protecting patients’ computer records
d. Safeguarding patients’ billing information
18. A Rootkits is a series of software tools that enable an unauthorized user to gain access
to a computer or network system without being detected.
20. Using _____ is a way to solve health issues related to computer equipment.
a. a high speed Internet
b. correct lighting
c. wired keyboards
d. a high capacity RAM
21. In the context of data communication, which of the following media is based on “line of
sight”?
a. A terrestrial microwave
b. A fiber-optic cable
c. A mechanical wave
d. A coaxial cable
22. _____ is a high-speed carrier service that uses ordinary phone circuits to send and
receive data.
a. Code division multiple access
b. A cable modem
c. An analog modem
d. Digital subscriber line
23. Unlike the other disadvantages of wireless, throughput is expected to become a bigger
problem in the future.
Select one:
True
False