Related Questions
Q11:
Which of the following can transmit germs? A)iris recognition systems B)digital forensics systems C)face recognition systems D)hand geometry systems
Q12:
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? A)digital security risk B)information liability C)technical terrorism D)network compromise
Q13:
Which of the following is a program or set of instructions in a program that allows users to bypass security controls? A)keygens B)indices C)rootkit D)back door
Q14:
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? A)hacker B)script kiddie C)cyberextortionist D)cyberterrorist
Q15:
-Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? A)PIN B)password C)secure key D)passtermQ17:
What occurs when someone steals personal or confidential information? A)information theft B)corruption C)fraud D)compaction
Q18:
Into which of the following kinds of ports do external fingerprint readers plug? A)parallel B)MIDI C)USB D)serial
Q19:
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? A)malware B)untrusted sources C)threats D)cybermalls
Q20:
Which of the following is a federally funded Internet security research and development center? A)W3C B)NSF C)CERT/CC D)Internet2
Q21:
How long can digital certificates be valid? A)six months B)two years C)four years D)five years
- Shuffle
Toggle On
Toggle Off
- Alphabetize
Toggle On
Toggle Off
- Front First
Toggle On
Toggle Off
- Both Sides
Toggle On
Toggle Off
- Read
Toggle On
Toggle Off
Card Range To Study
through
Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
- Share
- Export
- Clone
19 Cards in this Set
- Front
- Back
A ________ has the same intent as a cracker but does not have the technical skills and knowledge. | script kiddie | |
A ________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. | worm | |
Email ________ occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender. | spoofing | |
An ________ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it. | access control | |
A program called a ________ creates software registration numbers and sometimes activation codes. | keygen | |
A(n) ________ provides specific conditions for use of the software, which a user must accept before using the software. | license agreement | |
A website that uses encryption techniques to secure its data is known as a(n) ________ . | secure site | |
The notice that guarantees a user or a website is legitimate is called a ________ . | digital certificate | |
Keeping backup copies ________ means in a location separate from where you typically store or use your computer or mobile device. | off-site | |
________ , in which all data is backed up whenever a change is made, is very expensive and requires a great amount of storage. | continuous data protection | |
Enabling and configuring the ________ feature specifies the computers and mobile devices that can connect to your network. | MAC address control | |
________ are the moral guidelines that govern the use of computers, mobile devices, and information systems. | Computer ethics | |
A common infringement of copyright is ________ , where people illegally copy software, movies, and music. | piracy | |
The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ________ program to help reduce the amount of electricity used by computers and related devices. | ENERGY STAR | |
Critics contend that the information in a(n) ________ reveals more about an individual than anyone has a right to know. | electronic profile | |
During ________ browsing, your browser does not keep track of the websites you are visiting. | private | |
With ________ , an object that can be clicked on a website, such as a button, image, or link, contains a malicious program. | clickjacking | |
As related to the use of technology, ________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. | social engineering | |
Many businesses use ________ to restrict employees' access to certain material. | content filtering |
What has the same intent as a cracker but does not technical skills and knowledge?
Is someone who accesses a computer or network illegally but has the intent of destroying data stealing information or other malicious action?
Glossary | |
cracker | Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action. |
cybercrime | Online or Internet-based illegal acts. |
cyberextortionist | Someone who uses e-mail as a vehicle for extortion. |