computer security quiz

Ace your homework & exams now with Quizwiz!

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack

DoS

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____

adware

A group of compromised computers controlled by a hacker is called a _____.

botnet

A destructive program that replicates itself throughout a single computer or across a network is called a ____

computer worm

The malicious use of computer code to modify the normal operations of a computer or network is called a ___

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called ____

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

Which of the following would be considered a cybercrime?

data manipulation

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___

distributed denial of service

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a ____

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____

hacktivism

Firewall software used to block a user's access to specific Internet content is called a ___

internet filter

What is the name of a virus written in a macro language and placed within a document or spreadsheet

macro virus

Specialized hardware or software that capture packets transmitted over a network are called ____

packet sniffers

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______

pharming

An unsolicited email message is called _____

spam

Persistent cookies store information about

user preferences

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___

white hat hacker

A computer controlled by a hacker is called a _____

zombie

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Software that infects a computer and is created using computer code is called a computer _____.

virus

Small text file of information created by websites you visit that your web browser stores on your HD.

cookies


Related study sets

Chapter 16: Autonomic Nervous System

View Set

Abnormal Psychology Exam 2 (Chapters 7-9)

View Set

Chapter 9: Organizing the Body of the Speech

View Set

Ch 38: Allergic Disorders - PrepU

View Set

Chapter 2 Economics 18th edition Problems, What should you know, Self checks

View Set

Chapter 3: Medical , Legal, and Ethical Issues

View Set

Chapter 12/1: Disability Income Insurance

View Set