CGS Computer Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called

adware

A group of computers controlled by a hacker is called a

botnet

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a

cookie

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposed is called

hacktivism

A form of spyware that records all actions typed on a keyboard is called a ____ logger.

keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

macro virus

Cookies stored on a computer's hard drive and used to collect and store information about used preferences, password and user information, IP address, and/or data on web surfing behavior are called ____ cookies.

persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called

pharming

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

An unsolicited email message is called

spam

Persistent cookies store information about

user preferences

Software that infects a computer and is created using computer code is called a computer

virus

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a

worm

A computer controlled by a hacker is called a

zombie

Which of the following would be considered a cybercrime?

data manipulation

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

The acronym DDOS stands for

Distributed Denial of Service

Firewall software used to block a user's access to specific Internet content is called a ____ filter.

Internet

The malicious use of computer code to modify the normal operations of a computer or network is called a

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist


संबंधित स्टडी सेट्स

Adlington Bio 121 chapters 10 & 11 quiz

View Set

Chapter 11- Pure Competition in the Long Run

View Set

Mining Companies and Commodities

View Set

Chapter 3: Evidence-Based Decision Making

View Set

AP Chemistry: Unit 3 College Board Questions

View Set