Name: 
 

Chapter 1:  Section E



True/False
Indicate whether the statement is true or false.
 

 1. 

Although you might be asked to provide your own password, typically you are assigned one.
 

 2. 

Phishing is a sophisticated approach to password theft, and may use fake Web sites with URLs similiar to those on an official Web site.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 3. 

A(n) ____ protocol refers to any method that confirms a person’s identity using something the person knows.
a.
authentication
c.
user
b.
biometric
d.
two-factor
 

 4. 

____ are significant because they are the name on an account that requires a password.
a.
Parameters
c.
User IDs
b.
Possessed objects
d.
Passkeys
 

 5. 

____ protocols that use more than one means of identification are more secure than others.
a.
Validation
c.
Concatenation
b.
Authentication
d.
Collaboration
 

 6. 

PINs are typically used with ____-factor authentication protocols.
a.
single
c.
triple
b.
two
d.
multiple
 

 7. 

After you use a “forgot my password” link, if your identity checks out, your password is ____ to you.
a.
mailed
c.
e-mailed
b.
faxed
d.
all of the above
 

 8. 

____ can refer to a skilled programmer who manipulates computers with malicious intent.
a.
Remaster
c.
Blackjack
b.
Breaker
d.
Hacker
 

 9. 

Which of the following is a synonym for a criminal hacker?
a.
white hat
c.
cowboy
b.
black hat
d.
sheriff
 

 10. 

Which of the following is NOT true?
a.
Password thieves can easily find your password if you write it down on a yellow sticky note hidden under your keyboard.
b.
A hacker must have physical access to your work area to discover your password.
c.
A hacker can use a remote computer and software tools to systematically guess your password.
d.
A hacker can use a remote computer and software tools to intercept your password.
 

 11. 

Which of the following is NOT true?
a.
You should strive to select a unique user ID for every Web site you visit and every online resource you access.
b.
People with your name who selected user IDs before you might have already taken the obvious user IDs.
c.
You can maintain two or three tiers of passwords.
d.
Use low-security passwords in situations where you don’t really care if your security is compromised.
 

 12. 

At which of the following would you use your low-security password?
a.
an online banking site
b.
an online stock portfolio site
c.
an online bookstore that stores a copy of your credit card information
d.
None of the above
 

Essay
 

 13. 

Describe four different strategies in which hackers get your password, including some primitive ways and some more technological advanced methods.
 



 
Check Your Work     Start Over