COMPUTER SECURITY QUIZ

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Persistent cookies store information about.

User preferences.

Software that infects a computer and is created using computer code is called a computer _____.

Virus

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

a person who gains unauthorized access to networks in order to steal and corrupt information and data.

hacker

A group of compromised computers controlled by a hacker.

Botnet

___ is a crime in which a computer is the object of the crime or is used to commit a crime or offense.

Cybercrime

Which of the following would be considered a cybercrime?

Data manipulation

the act of hacking, or breaking into a computer system for a politically or socially motivated purpose.

Hactivism

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

a form of spyware that records all actions typed on a keyboard is called a ___ logger.

keystroke

An unsolicited email message is called _____.

spam

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

distributed denial of service

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

Specialized hardware or software that capture packets transmitted over a network.

Packet sniffers

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a/an _____.

Cookie

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

Cyberterrorist

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

Firewall

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

Macro virus

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

Persistent

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

White hat hackers

A computer controlled by a hacker.

Zombie

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack


संबंधित स्टडी सेट्स

Kidney Disorders and Therapeutic Management (Urden ch. 26)

View Set

Med Surg Chapter 36 Assessment of the Hematologic System & 37 Concepts of Care for Patients with Hematologic Problems Ignatavicius

View Set

Chapter 55: Care of Patients with Stomach Disorders

View Set

Get your program started with the main function

View Set

Chapter 18 Amino acid Oxidation and the Production of Urea

View Set

Unit 3 - The Begginnings of Romanticism

View Set

CompTIA A+ : Chapter 20 (Wireless Networking)

View Set

Chapter 14 Social Security and Tax Consequences Correct

View Set

Development of Constitutional Government 2

View Set