Chapter 3— Computer Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a ___________.

Cyberbully

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____________.

Antivirus software

Worms:

Automatically reproduces itself.

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Network _______ Translation (NAT) provides a type of firewall protection by hiding internal IP addresses.

Address

Online nuisances:

Adware, spyware, and spam

Black hat hackers

Break into computer systems with the intent of causing damage or stealing data.

White hat hackers

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions.

A deliberate misuse of computers and networks, ___________ use malicious code to modify the normal operations of a computer or network.

Cyberattacks

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _________.

Cybercrime

What does DDoS stand for?

Distributed Denial of Service

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___________.

Hacktivism

Overheating, humidity, and magnetic fields can cause damage to the _____________ of a digital device.

Hardware

Firewall software used to block a user's access to specific Internet content is called a(n) _________ filter.

Internet

A form of spyware that records all actions typed on a keyboard is called a _________ logger.

Keystroke

What is true about packet sniffers?

Legitimate sniffers are used for routine examination and problem detection and unauthorized sniffers are used to steal information.

Malware is short for ____________ software.

Malicious

Experts suggest using password __________ software to keep your passwords safe.

Management

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.

Meltdown and Spectre

The technology that provides a type of firewall protection by hiding internal IP addresses is called _________.

NAT

Typically computer viruses must be _________ to attack and do damage to a digital device.

Opened

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as __________.

Pharming

What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

Proxy

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

Quarantine

A type of malware that is triggered each time you boot your computer is called a ___________.

Rootkit

Software programs that hide in the operating system and allow for the installation of hidden files are called:

Rootkits

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___________ mode.

Safe

Specialized hardware or software that captures packets transmitted over a network are called packet ________

Sniffers

DeSean received an unsolicited email message from an unknown sender. This email was __________.

Spam

Ted installs computer software designed to prevent spam messages from entering his email inbox. This type of software is called a _________ filter.

Spam

Software that collects information about your Internet surfing habits and behaviors is called __________.

Spyware

What's true of script kiddies?

They illegally gain access to computer systems using programs (scripts) that others have written and they are typically amateur computer hackers with little programming expertise.

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a __________.

Trojan

Spam messages are sometimes called ________ and are used for a variety of marketing purposes including selling products and services.

UBE

Sharing infected files and opening an infected email attachment are ways that a computer _________ can infect a digital device.

Virus

Ransomware:

When activated, encrypts files on user hard drive and then sells a decryption program.

A type of malware that replicates itself throughout a single computer or across a network is called a __________.

Worm

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber-___________.

terrorist


संबंधित स्टडी सेट्स

MGT 371 Ch6-10 vocab + study module + quizzes

View Set

Interpersonal Communication Chapter 7

View Set

Chapter 35: Care of the Patient with a Psychiatric Disorder Cooper: Foundation of Nursing, 9th Edition

View Set

Unit 4- Natural Disasters Test Study Guide (Chapters 6, 7, and 8)

View Set

Intro to Supply Chain Management (Chapter 5, 6, 7

View Set