COMPUTER SECURITY QUIZ

¡Supera tus tareas y exámenes ahora con Quizwiz!

Persistent cookies store information about.

User preferences.

Software that infects a computer and is created using computer code is called a computer _____.

Virus

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

a person who gains unauthorized access to networks in order to steal and corrupt information and data.

hacker

A group of compromised computers controlled by a hacker.

Botnet

___ is a crime in which a computer is the object of the crime or is used to commit a crime or offense.

Cybercrime

Which of the following would be considered a cybercrime?

Data manipulation

the act of hacking, or breaking into a computer system for a politically or socially motivated purpose.

Hactivism

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

a form of spyware that records all actions typed on a keyboard is called a ___ logger.

keystroke

An unsolicited email message is called _____.

spam

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

distributed denial of service

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

Specialized hardware or software that capture packets transmitted over a network.

Packet sniffers

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a/an _____.

Cookie

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

Cyberterrorist

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

Firewall

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

Macro virus

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

Persistent

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

White hat hackers

A computer controlled by a hacker.

Zombie

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack


Conjuntos de estudio relacionados

Kidney Disorders and Therapeutic Management (Urden ch. 26)

View Set

Med Surg Chapter 36 Assessment of the Hematologic System & 37 Concepts of Care for Patients with Hematologic Problems Ignatavicius

View Set

Chapter 55: Care of Patients with Stomach Disorders

View Set

Chapter 18 Amino acid Oxidation and the Production of Urea

View Set

Unit 3 - The Begginnings of Romanticism

View Set

CompTIA A+ : Chapter 20 (Wireless Networking)

View Set

Chapter 14 Social Security and Tax Consequences Correct

View Set

Development of Constitutional Government 2

View Set