COSC 1301 Final Exam Questions and All Correct Answers
4 views 0 purchase
Module
COSC 1301
Institution
COSC 1301
COSC 1301 Final Exam Questions and All Correct Answers
A driver's license, a speeding ticket, a birth certificate - Answer-government databases
Symantec's MessageLabs recently estimated that more than ____ percent of all email messages is spam. - Answer-90
FDE devices are designed to withst...
COSC 1301 Final Exam Questions and
All Correct Answers
A driver's license, a speeding ticket, a birth certificate - Answer-government databases
Symantec's MessageLabs recently estimated that more than ____ percent of all email
messages is spam. - Answer-90
FDE devices are designed to withstand much more physical abuse than conventional
devices. - Answer-False
The best protection against many dot cons is ____. - Answer-protecting your identity
All 50 U.S. states have made cyberstalking illegal. - Answer-True
To protect hardware from damage due to power fluctuations, everyone should use a(n)
____________________ with a computer whenever it is plugged into a power outlet. -
Answer-surge suppressor*
A UPS is designed to provide enough power for a computer to remain briefly powered
up if the electricity goes off. - Answer-True
A(n) ____ prevents power spikes from harming your computer system. - Answer-surge
suppressor
Referring to the text in this chapter, CPO stands for ___ - Answer-chief privacy officer
You study a series of real-life issues to determine what kind of security and/or privacy
threat you are facing.
Lastly, you are planning to do a lot of business travel in the near future. You will be
bringing your laptop computer with you. You look into ways to secure the information on
your computer, and decide that the most secure is to ____. - Answer-install a hard drive
that uses FDE
____ is a generic term that refers to any type of malicious software. - Answer-Malware
Market filtering refers to following a predesignated procedure to remove yourself from
marketing lists, or otherwise preventing your personal information from being obtained
or shared by others. - Answer-False
,A hacker changing the IP addresses used in conjunction with a particular company's
Web site to re-route them to the hacker's servers is called DNS
____________________. - Answer-poisoning*
Often, a worm is sent to other computers via an email ____________________. -
Answer-attachment*
The text lists all of the following as dangerous to a computer EXCEPT ____. - Answer-
dryness
____ devices are designed to withstand much more physical abuse than conventional
devices. - Answer-Ruggedized
A group of zombie computers controlled by one individual, working together in a
coordinated fashion, is called a(n) ____ - Answer-botnet
Each question contains a brief list of things commonly associated with daily life.
Examine the list, then choose the answer that most closely correlates to the list.
U.S. SAFE WEB, Real ID, Graham-Leach-Bliley - Answer-computer security and
privacy legislation
____ technology is the ability of one computing device on a network to identify another
device on the same network and determine its status - Answer-Presence
You have found an interesting calendar program at a Web site and downloaded it to
help you stay organized. However, within a couple days of installing the program, your
computer starts behaving oddly. Strange popups appear, the home page of your
Internet browser has been switched, and the system is running sluggishly. You likely
have installed a ____. - Answer-Trojan horse
A document with a(n) ____ guarantees that the document was indeed sent by a specific
individual and that it hasn't been tampered with after it was sent. - Answer-digital
signature
____ emails are directly targeted to a specific individual, usually in order to steal
intellectual property. - Answer-Spear phishing
Computer crimes involving online fraud, theft, scams, and related activities designed to
steal money or other resources from individuals or businesses are collectively referred
to as ___________________ - Answer-dot cons*
DDoS attacks are typically performed by botnets. - Answer-True
Digital certificates are granted to a user by the ISP that hosts the user's account. -
Answer-False
,Dot con software protects a computer against malware. - Answer-False
The URL for Web pages using SSL begins with https:. - Answer-True
A(n) ____ creates a barrier between a computer or network and the Internet in order to
protect against unauthorized access. - Answer-firewall
The accompanying figure is an example of ____________________.
(cartoon of company selling user info) - Answer-electronic profiling*
______________________________ Internet access is a direct connection that
transmits via standard telephone lines, but does not tie up your telephone line. -
Answer-DSL*
Router manufacturer, maker of the latest Web browser, computer designer are ____ -
Answer-hardware and software companies
____ is available in selected areas, uses transmission towers, and can reach speeds
typically up to 6 Mbps. - Answer-Fixed wireless
According to FBI statistics, the recovery rate of a lost or stolen personal computer is
about ____ percent. - Answer-2-3
____________________ involves terrorists launching an attack via the Internet. -
Answer-cyberterrorism*
Hacking most often occurs ____. - Answer-over the Internet or another network
The terms "Internet" and "World Wide Web" are interchangeable. - Answer-False
Tim Berners-Lee proposed the idea of email. - Answer-False
A Web site's home page appears when you type the domain name and top-level domain
of a Web site. - Answer-True
Keying multiple keywords are sometimes called a search engine. - Answer-False
The Internet Explorer Favorites tab tracks the Web pages you visit over a certain time
period, not just during a browsing session. - Answer-False
Microsoft Windows Live Mail is an example of email software. - Answer-True
A cookie is a file that you send with an email message. - Answer-False
, Third-party cookies are placed on your hard drive by a company other than the one
associated with the Web page you are viewing—typically a Web advertising company. -
Answer-True
DSL uses a direct connection and is "currently" (according to textbook) the most widely
used type of home broadband connection. - Answer-False
Wireless networks usually use ____ signals to send data. - Answer-radio
A(n) ____ network uses a central cable to which all network devices connect. - Answer-
bus
The way a network is designed to communicate is known as its ____. - Answer-
architecture
A(n) ____ is a computer that requests and uses network resources from a(n) ____. -
Answer-client, server
In the accompanying figure, ____ is the first step in connecting to a Wi-Fi hotspot. -
Answer-Click the wireless network icon.
What can you tell from the accompanying figure? - Answer-PadNet is the only Wi-Fi
hotspot in range that is broadcasting its name openly.
A network consisting of a person's portable computer, mobile phone, and digital camera
would be considered a ____. - Answer-PAN
Microsoft and Google have created large networks known as ____ to provide free or
low-cost Internet access to area residents. - Answer-MANs
A company network that is accessible to authorized outsiders is called a(n) ____. -
Answer-extranet
A(n) ____ is a secure, private path across a public network that is set up to allow
authorized users private, secure access to the company network - Answer-VPN
Most networking media send data using ____ signals. - Answer-digital
With ____ transmission, data is sent one bit at a time. - Answer-serial
Serial transmission may involve any of the following techniques EXCEPT ____
transmission. - Answer-metasynchronous
In the accompanying figure, ____ box represents asynchronous transmission. - Answer-
the middle
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.27. You're not tied to anything after your purchase.