computer security quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet

macro virus

Specialized hardware or software that capture packets transmitted over a network are called ____

packet sniffers

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______

pharming

An unsolicited email message is called _____

spam

Persistent cookies store information about

user preferences

Software that infects a computer and is created using computer code is called a computer _____.

virus

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___

white hat hacker

A computer controlled by a hacker is called a _____

zombie

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack

DoS

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____

adware

A group of compromised computers controlled by a hacker is called a _____.

botnet

A destructive program that replicates itself throughout a single computer or across a network is called a ____

computer worm

Small text file of information created by websites you visit that your web browser stores on your HD.

cookies

The malicious use of computer code to modify the normal operations of a computer or network is called a ___

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called ____

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

Which of the following would be considered a cybercrime?

data manipulation

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___

distributed denial of service

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a ____

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____

hacktivism

Firewall software used to block a user's access to specific Internet content is called a ___

internet filter


Conjuntos de estudio relacionados

Comboset 5 -(C228) ATI-Community Health <Tests & Vocab>

View Set

Florida Statutes, Rules, and Regulations Common to All Lines QUIZ

View Set

CHAPTER 16 CHILD AND ADOLESCENT DISORDERS

View Set

Intermediate Accounting 3303 Chap 6

View Set

NU272 Week 6 EAQ Evolve Elsevier: Professionalism, Health, Wellness, Illness, Caring

View Set

Comptia A+ Practice Exam - Troubleshooting

View Set

CIST2431-Introduction UNIX/Linux Quiz 2

View Set

Chapter 28: Safety, Security, and Emergency Preparedness

View Set