Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A self-contained program that spreads through a computer network by exploiting security holes is called a worm

A program with a benign capability that conceals another, sinister purpose is called a trojan horse.

The __________________________ criminalizes a wide variety of hacker-related activities.

Computer Fraud and Abuse Act

Vote-counting irregularities in the State of _____________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.

Florida

The internet worm was released by

Robert Morris, Jr..

An intentional action designed to prevent legitimate users from making use of a computer service is called

a denial-of-service attack.

Anonymous is

a loosely organized group of hactivists that claimed responsibility for a DDoS attack on Church of Scientaology Web sites.

A file accompanying an email message is called an ________________.

attachment

Determining that a person is who he or she claims to be on a computer is called

authentication

The process of determining that a user has permission to perform a particular action on a computer is called

authorization

A software program that responsds to commands sent by a comand-and-control program locataed on an external computer is called a

bot

According to some estimates, 90 percent of spam is distributed through_______ networks.

bot

The Conficker worm is notable because

computer experts have found it particularly difficult to eradicate

An intentional action designed to prevent legitimate users from making use of a computer service is called a ___________________________.

denial-of-service (DoS) attack

A ___________ is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.

firewall

You may find a virus

on a hard disk, on a floppy disk, on a CD-ROM, or in an email attachment

Manipulating someone within an organization to gain access to confidential information is called

social engineering

The manipulation of a person inside an organization to gain access to confidential information is called ______________.

social engineering

A _______ is a piece of self-replicating code embedded within another program called the host.

virus

A piece of self-replicating code embedded within another program is called a

virus

A _____________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

worm


Ensembles d'études connexes

Chapter 40: inflation and deflation

View Set

10.3- where is agriculture distributed

View Set

RN Learning System: Nursing Care of Children Practice Quiz 1 & 2

View Set

RN Maternity HESI Review Questions

View Set

Chapter 12: Gender and Sexuality

View Set

new economic theories assignment

View Set

Chapter 6- Elasticity: The Responsiveness of Demand and Supply

View Set

VGP 3rd 6-Weeks Test Review 20/21

View Set