CGS2060 Computer Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Cookie

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.

White Hat Hackers

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.

Adware

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.

Hacktivism

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

Sniffers

What does DDoS stand for?

Distributed Denial of Service

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.

Firewall

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.

Hacker

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

Macro virus

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

Pharming

An unsolicited email message is called ____.

Spam

Persistent cookies store information about _____.

User preferences

Software that infects a computer and is created using computer code is called a computer _____.

Virus

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

A computer controlled by a hacker is called a ____.

Zombie

A group of compromised computers controlled by a hacker is called a ____.

Botnet

Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies

C

The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.

Cyberattack

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.

Cyberterrorist

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.

Cybercrime


Conjuntos de estudio relacionados

Medical Laboratory Science Review Harr. 2.1 Coagulation and Fibrinolytic Systems/Reagents and Methods

View Set

Lesson 3 - The Enhanced Entity-Relationship (EER) Model

View Set

Rh sensitization and ABO incompatibility

View Set

Concept 3: Naming Covalent Compounds

View Set

The social contract between employers and employees.

View Set

Final: Chapter 12 Leadership PT2

View Set

Cambridge Latin Course: Unit 1: Stage 12 Vocabulary

View Set