CSCI Ch 06 Test
how is a worm different from a trojan
A worm spreads through a network, whereas a Trojan hides inside another program.
script kiddies
Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.
nation state actors
State-sponsored attackers employed by a government for launching computer attacks against other countries considered to be enemies.
cyberterrorists
attack a nation's computer networks like the electrical power grid to cause disruptions and panic among citizens
Hactivists
attackers who are strongly motivated by principles or beliefs
there are various risks from attacks on wi-fi networks. These include all of the following except
creating malware
when you access a secure website what information does your browser use to verify that web servers identity and encryption information
digital certificate
insiders
employees contractors and business partners of a company
marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone except which one?
he can use remote tracking to retrace the thief's steps
which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information
pretexting
what is a digital certificate
technology used to verify a user's identity