computer security quiz
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack
DoS
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____
adware
A group of compromised computers controlled by a hacker is called a _____.
botnet
A destructive program that replicates itself throughout a single computer or across a network is called a ____
computer worm
The malicious use of computer code to modify the normal operations of a computer or network is called a ___
cyberattack
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called ____
cybercrime
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberterrorist
Which of the following would be considered a cybercrime?
data manipulation
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___
distributed denial of service
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____
firewall
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a ____
hacker
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____
hacktivism
Firewall software used to block a user's access to specific Internet content is called a ___
internet filter
What is the name of a virus written in a macro language and placed within a document or spreadsheet
macro virus
Specialized hardware or software that capture packets transmitted over a network are called ____
packet sniffers
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______
pharming
An unsolicited email message is called _____
spam
Persistent cookies store information about
user preferences
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___
white hat hacker
A computer controlled by a hacker is called a _____
zombie
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Software that infects a computer and is created using computer code is called a computer _____.
virus
Small text file of information created by websites you visit that your web browser stores on your HD.
cookies