CSCI Ch 06 Test

¡Supera tus tareas y exámenes ahora con Quizwiz!

how is a worm different from a trojan

A worm spreads through a network, whereas a Trojan hides inside another program.

script kiddies

Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.

nation state actors

State-sponsored attackers employed by a government for launching computer attacks against other countries considered to be enemies.

cyberterrorists

attack a nation's computer networks like the electrical power grid to cause disruptions and panic among citizens

Hactivists

attackers who are strongly motivated by principles or beliefs

there are various risks from attacks on wi-fi networks. These include all of the following except

creating malware

when you access a secure website what information does your browser use to verify that web servers identity and encryption information

digital certificate

insiders

employees contractors and business partners of a company

marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone except which one?

he can use remote tracking to retrace the thief's steps

which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information

pretexting

what is a digital certificate

technology used to verify a user's identity


Conjuntos de estudio relacionados

Chapter 21:Carbohydrate Metabolism

View Set

UNIT 1 CHAPTER 52 SEXUALLY TRANSMITTED INFECTIONS

View Set

Ch. 18 Exam Questions (Health) - Health Insurance Underwriting

View Set

Opportunity Cost and Rational Decisions

View Set

Prep U - Qs /Chapter 57: Drugs Affecting Gastrointestinal Secretions

View Set

6.7.2 Ethernet and IP Protocol Quiz

View Set