CC Module 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ uses the unique characteristics of your hand, face, or eyes to authenticate you.

Biometrics

______ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."

Encryption

When creating a strong password _____ is the most important element.

Length

Wi-Fi Protected Access 2 (WPA2) does what?

Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

______ are attackers who want to attack computers but lack the knowledge needed to do so.

Script Kiddies

A _______ is a very short duration of a voltage increase that can be absorbed by a surge protector.

Spike

A ________ is a malicious program that uses a computer network to replicate.

Worm


संबंधित स्टडी सेट्स

English Comp I - made by a fellow student

View Set

PHSL 3051 Unit 1 Learning Objectives

View Set

Utah Property-Insurance Regulation

View Set

Les grandes dates de la Révolution française

View Set

Philosophy of Religion, War & Christin Theology Exam

View Set

Document Navigation and Selection Techniques

View Set