computer security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack

DDOS

The acronym DDoS stands for

Distributed denial of service

a group of compromised computers controlled by a hacker is called a

botnet

a small text or file of information created by websites you visit that your web browser stores on your hard disk is called a(n)

cookie

a crime in which a computer is the object of the crime or is used to commit a crime or offense is called

cybercrime

a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist

which of the following would be considered a cyber crime

data manipulation

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a

firewall

a person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a

hacker

the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called

hacktivism

firewall software used to block a user's access to specific internet content is called a(n) _____ filter

internet

a form of spyware that records all actions typed on a keyboard is called a _____ logger

keystroke

what is the name of a virus written in a macro language and placed within a document or spreadsheet

macro virus

cookies stored on a a computer's hard drive and used to collect data and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ____ cookies

persistent

a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called

pharming

specialized hardware or software systems capture packets transmitted over a network are called packet

sniffers

an unsolicited email message is called

spam

persistent cookies store information about

user preferences

software that infects a computer and is created using computer code is called a computer

virus

software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called

adware

the malicious use of computer code to modify the normal operations of a computer or network is called a (n)

cyberattack

harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called

white hat hackers

a destructive program that replicates itself throughout a single computer across a network is called

worm

a computer controlled by a hacker is called a

zombie


संबंधित स्टडी सेट्स

Trigeminal Neuralgia, Bell's Palsy, Guillain-Barre, Pediatric NCLEX

View Set

Classic Mechanics and the Wave Model

View Set

A&P - Anatomy & Physiology: The Unity of Form and Function - Chapter 20: The Blood Vessels - MEGAKIT

View Set

FIN APPS II FINAL EXAM REVIEW (TRUE OR FALSE Q'S)

View Set

Environmental Science Ch. 15 and 16

View Set

PUR 4000 - Test 2 Public Relations

View Set