A … has the same intent as a cracker but does not have the technical skills and knowledge.


  • Q11:

    Which of the following can transmit germs? A)iris recognition systems B)digital forensics systems C)face recognition systems D)hand geometry systems

  • Q12:

    Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? A)digital security risk B)information liability C)technical terrorism D)network compromise

  • Q13:

    Which of the following is a program or set of instructions in a program that allows users to bypass security controls? A)keygens B)indices C)rootkit D)back door

  • Q14:

    Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? A)hacker B)script kiddie C)cyberextortionist D)cyberterrorist

  • Q15:

    A … has the same intent as a cracker but does not have the technical skills and knowledge.
    -Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? A)PIN B)password C)secure key D)passterm

  • Q17:

    ​What occurs when someone steals personal or confidential information? A)information theft B)corruption C)fraud D)compaction

  • Q18:

    Into which of the following kinds of ports do external fingerprint readers plug? A)parallel B)MIDI C)USB D)serial

  • Q19:

    Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? A)malware B)untrusted sources C)threats D)cybermalls

  • Q20:

    Which of the following is a federally funded Internet security research and development center? A)W3C B)NSF C)CERT/CC D)Internet2

  • Q21:

    How long can digital certificates be valid? A)six months B)two years C)four years D)five years

  • Shuffle

    Toggle On

    Toggle Off

  • Alphabetize

    Toggle On

    Toggle Off

  • Front First

    Toggle On

    Toggle Off

  • Both Sides

    Toggle On

    Toggle Off

  • Read

    Toggle On

    Toggle Off

Card Range To Study

through

A … has the same intent as a cracker but does not have the technical skills and knowledge.

A … has the same intent as a cracker but does not have the technical skills and knowledge.

A … has the same intent as a cracker but does not have the technical skills and knowledge.

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

  • Share
  • Print
  • Export
  • Clone

19 Cards in this Set

  • Front
  • Back

A ________ has the same intent as a cracker but does not have the technical skills and knowledge.

script kiddie

A ________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.

worm

Email ________ occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender.

spoofing

An ________ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

access control

A program called a ________ creates software registration numbers and sometimes activation codes.

keygen

A(n) ________ provides specific conditions for use of the software, which a user must accept before using the software.

license agreement

A website that uses encryption techniques to secure its data is known as a(n) ________ .

secure site

The notice that guarantees a user or a website is legitimate is called a ________ .

digital certificate

Keeping backup copies ________ means in a location separate from where you typically store or use your computer or mobile device.

off-site

________ , in which all data is backed up whenever a change is made, is very expensive and requires a great amount of storage.

continuous data protection

Enabling and configuring the ________ feature specifies the computers and mobile devices that can connect to your network.

MAC address control

________ are the moral guidelines that govern the use of computers, mobile devices, and information systems.

Computer ethics

A common infringement of copyright is ________ , where people illegally copy software, movies, and music.

piracy

The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ________ program to help reduce the amount of electricity used by computers and related devices.

ENERGY STAR

Critics contend that the information in a(n) ________ reveals more about an individual than anyone has a right to know.

electronic profile

During ________ browsing, your browser does not keep track of the websites you are visiting.

private

With ________ , an object that can be clicked on a website, such as a button, image, or link, contains a malicious program.

clickjacking

As related to the use of technology, ________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

social engineering

Many businesses use ________ to restrict employees' access to certain material.

content filtering

What has the same intent as a cracker but does not technical skills and knowledge?

A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.

Is someone who accesses a computer or network illegally but has the intent of destroying data stealing information or other malicious action?

Glossary
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
cybercrime
Online or Internet-based illegal acts.
cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
Student Resource Glossary - Cengagewww.cengage.com › cgi-wadsworth › course_products_wpnull

What is a person called when he or she illegally accesses your computer?

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.

What is the term for a program that performs a repetitive task?

bot. A program that performs a repetitive task on a network. botnet. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.