CC Module 6
________ uses the unique characteristics of your hand, face, or eyes to authenticate you.
Biometrics
______ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
Encryption
When creating a strong password _____ is the most important element.
Length
Wi-Fi Protected Access 2 (WPA2) does what?
Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing
______ are attackers who want to attack computers but lack the knowledge needed to do so.
Script Kiddies
A _______ is a very short duration of a voltage increase that can be absorbed by a surge protector.
Spike
A ________ is a malicious program that uses a computer network to replicate.
Worm