CGS Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called

adware

A group of computers controlled by a hacker is called a

botnet

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a

cookie

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposed is called

hacktivism

A form of spyware that records all actions typed on a keyboard is called a ____ logger.

keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

macro virus

Cookies stored on a computer's hard drive and used to collect and store information about used preferences, password and user information, IP address, and/or data on web surfing behavior are called ____ cookies.

persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called

pharming

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

An unsolicited email message is called

spam

Persistent cookies store information about

user preferences

Software that infects a computer and is created using computer code is called a computer

virus

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a

worm

A computer controlled by a hacker is called a

zombie

Which of the following would be considered a cybercrime?

data manipulation

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

The acronym DDOS stands for

Distributed Denial of Service

Firewall software used to block a user's access to specific Internet content is called a ____ filter.

Internet

The malicious use of computer code to modify the normal operations of a computer or network is called a

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist


Set pelajaran terkait

Adlington Bio 121 chapters 10 & 11 quiz

View Set

Chapter 11- Pure Competition in the Long Run

View Set

Mining Companies and Commodities

View Set

Chapter 3: Evidence-Based Decision Making

View Set

AP Chemistry: Unit 3 College Board Questions

View Set