IT 301 Ciampa Ch 1-3

Ace your homework & exams now with Quizwiz!

False

(T) OR (F) Data backups only protect data against computer attacks.

True

(T) OR (F) Files backed up through online services can be made available to another computer.

True

(T) OR (F) Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.

False

(T) OR (F) There is a straightforward and easy solution to securing computers.

Credit score

A ____ is a numerical measurement used by lenders to assess a consumer's creditworthiness.

Worm

A ____ is a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer.

Rootkit

A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

Trojan

A computer ___________________ is an executable program that contains hidden malware code.

Vulnerability

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.

Threat

A(n) ____ is a type of action that has the potential to cause harm.

Macro

A(n) ___________________ is a series of instructions that can be grouped together as a single command.

Hoax

A(n) ____________________ is a false warning, often contained in an e-mail message claiming to come from the IT department.

Social networking

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

Security

In a general sense, ____________________ can be defined as the necessary steps to protect a person or property from harm.

People

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

Pharming

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

Antivirus

One of the first software security applications is ____ software.

Rootkit

Originally the term ___________________ referred to a set of modified and recompiled tools for the UNIX operating system.

Advertising

Spyware usually performs one of the following functions on a user's computer: ____, collecting personal information, or changing computer configurations.

Digest

Technically speaking, the process for creating a password digital representation is based on a hash algorithm, which creates a(n) ____________________.

Social networking sites

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.

Password management tool

The best approach to establishing strong security with passwords is to use a ____.

Information Security

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

HIPAA

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

Availability

____ ensures that data is accessible when needed to authorized users.

Integrity

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.

Swiss cheese

____ infection injects portions of the code throughout the program's executable code instead of only at the end of the file (any overwritten original code is transferred and stored inside the virus code for proper execution of the host program after the infection).

Phishing

____ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information.

Dumpster Diving

____________________ involves digging through trash receptacles to find information that can be useful in an attack.

Conformity

____________________ is a group-based behavior, yet it can be used on an individual by convincing the victim that everyone else has been giving the attacker the requested information.


Related study sets

Practice: Mixed-Set MBE PQs Session 11

View Set

APUSH- Reconstruction - Gilded Age Multiple Choice Practice

View Set

Phys 111 Dr. Echols Lecture Focus Questions

View Set

Ephesians 2:4-10 and Ephesians 2:19-22 and Ephesians 3:14-21

View Set