True/False Mark T for True and F for False. If False, rewrite the statement so that it is True.
__F__1. Software used by cyber- criminals sometimes is called crimeware.
__F__2. Adware displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.
__T__3. Viruses, worms, and other malware can be hidden in downloaded game files and mobile apps.
__T__4. An audit trail records in a file both successful and unsuccessful access attempts.
__T__5. It is good practice to change your password frequently.
__T__6. Intentionally erasing software would be considered software theft.
__T__7. A typical license agreement allows you to rent or lease the software.
__F__8. Unencrypted, readable data is called plaintext.
__F__9. Private key encryption also is called symmetric key encryption.
__T__10. VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people.
__T__11. When data is traveling to or from a computer to a cloud service, it is subject to interception.
__T__12. Full backups are made at regular intervals on removable media in a grandparent-parent-child backup scheme.
Match the terms with their definitions.
__I__1. access control
__E__4. digital certificate
__F__5. disc burning software
__H__8. script kiddie
__J__9. technology ethics
a. compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
b. scam in which a perpetrator sends a message in an attempt to obtain personal or financial information
c. program that performs a repetitive task on a network
d. small text file that a web server stores on your computer
e. notice that guarantees a user or website is legitimate
f. program that writes text, graphics, audio, and video files on a recordable or rewritable disc
g. program that creates software registration numbers and sometimes activation codes
h. hacker who does not have the technical skills and knowledge of a cracker
i. security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
j. moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
1. No Browsing history While using the browser on your tablet, you realize that it is not keeping a history of websites you have visited. Why might this be happening, and what is the first step you will take to correct this problem?
The device maybe in private browsing mode which will not saving any cache cookies or browsing history. Depending on which OS is being used you would take it out of private browsing by selecting the private button.
2. Phishing scam just received an email message from someone requesting personal identification information. Believing the message was legitimate, you provided the requested information to the original sender. You now realize, however, that you might have fallen victim to a phishing scam. What are your next steps?
You could contact the police and give them the email address. You can also contact you bank and let them know to freeze your account.
3. Suspicious File attachment You receive an email message that appears to be from someone you know. When you try to open the attachment, nothing happens. You attempt to open the attachment two more times without any success. Several minutes later, your computer is running slower and you are having trouble running apps. What might be wrong?
The attachment has malicious code in it that infected your computer with a virus.
4. Antivirus software outdated After starting your computer and signing in to the operating system, a message is displayed stating that your virus definitions are out of date and need to be updated. What are your next steps?
Make sure that the message is coming from your anti-virus. Sometimes an anti-virus that you have never heard will ask to update the definitions but, it is actually a virus. If it is trusted then update your anti-virus.
5. Laptopís Physical security You plan to start taking your laptop to school so that you can record notes in class. You want to make sure, however, that your computer is safe if you ever step away from it for a brief period of time. What steps can you take to ensure the physical security of your laptop?
†††††† You could bring a laptop lock from home and lock it to your desk. Make sure you use two factor authentication. Always lock your computer when stepping away.