Computer Security Quiz - 96%

¡Supera tus tareas y exámenes ahora con Quizwiz!

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ . -Distributed Denial of Service -Developed Denial of Security -Distributed Denial of Secuirty -Developed Denial of Service

Distributed Denial of Service

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ . -email -adware -worming -spoofing

adware

A group of compromised computers controlled by a hacker is called a _____. -cyborg -botnet -netsys -network

botnet

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____. -driver -cookie -app -spam

cookie

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ . -cyber-intruder -cyber-threat -cyberattack -app

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____. -techbullying -cyberbullying -malware -cyberattacking

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____. -cybercrime -cyberbullying -cyberstalking -cyberattack

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___. -terrorist -cyberterrorist -hacker -cyberattacker

cyberterrorist

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____. -router -switch -NAT -firewall

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____. -snoop -hacker -trespasser -zombie

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____. -activism -hacktivism -Adwaru -digi-terrorism

hacktivism

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter. -Internet -malware -safety -content

internet

A form of spyware that records all actions typed on a keyboard is called a _____ logger. -keystroke -input -command -touch

keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet. -polymorphic virus -macro virus -micro virus -memory resident viruses

macro virus

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies. -session -data -database -persistent

persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ . -spoofing -pharming -farming -trolling

pharming

Specialized hardware or software that capture packets transmitted over a network are called packet _____. -snoops -sniffers -snakes -analyzers

sniffers

An unsolicited email message is called _____. -spyware -phishing -pharming -spam

spam

Which of the following would be considered a cybercrime? -3rd party cookies -data manipulation -spam -adware

spam

Persistent cookies store information about -user preferences -utility programs -operating system configuration -web site preferences

user preferences

Software that infects a computer and is created using computer code is called a computer _____. -virus -attack -application -spam

virus

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___. -cyber security specialists -white hat hackers -black hat hackers -cyber analysts

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a _____. -worm -DoS -DDoS -zombie

worm

A computer controlled by a hacker is called a _____. -zombie -virus -cyborg -robot

zombie

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack. -virus -zombie -worm -DDos

*DDos*


Conjuntos de estudio relacionados

Sociology chapter 14 urbanization final

View Set

CHEM 1160- Reaction Rates and Relative Reaction Rates

View Set

Chapter 13: Peripheral and Central IV therapy

View Set

Art Hist 101: Test 4 (19th C. (Realism, Impressionism, Post Impressionism, Art Nouveau, 19th Century Architecture))

View Set