5. chapter 5

Your page rank:

Total word count: 930
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following terms is used to describe a program that hides inside a harmless or useful program but then gets out and does damage to your computer?

Trojan horse

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

The term CAPTCHA is _____________.

a series of distorted characters that a user is required to enter correctly to continue using a website

The term firewall is _____________.

hardware and/or software that protects a network’s resources from intrusion

Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure?

cyber extortionist

What is the term for a website that uses encryption techniques to protect its data?

secure site

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

rootkit

The term, zombie, is _____________.

a computer whose owner doesn’t know that the computer or device is being controlled remotely by an outsider

A __________ is an network of ______________.

botnet/ zombies

The term, payload, as it pertains to computer crime, is defined as _____________.

the destructive event or prank the program is intended to deliver

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

phishing

Storing back up files to a server that you get to by going across the Internet is called __________________.

cloud back up

Which of the following terms is used to describe a small text file that a web server stores on your computer?

cookie

In which particularly devastating type of DoS attack are multiple zombie computers used to attack multiple computer networks?

distributed

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

worm

Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission ?

virus

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

digital certificate

In the world of computer security, a possessed object is ___________.

a key, card or some other item that you must have with you to get access to a computer or a building

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

malware

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

digital security risk

Which of the following best describes the term, cybercrime?

online or internet-based illegal acts

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

cyber-terrorist

Which of the following has the same intent as a hacker, but does not have the technical skills and knowledge? Instead he has to find programs to use on the Internet.

script kiddie

What is the general term for programs that act without a user’s knowledge and deliberately delete data or change the way the computer runs?

malware

The term, botnet, means _____________.

a group of zombie (controlled) computers connected to a network that attacks other networks

What happens during a DDoS attack?

A zombie army is used to attack computers or computer networks.

The term back door, as it refers to computer crime, is _____________.

a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

spoofing

What is an AUP intended to do?

outline computer activities for which the computer and network may or may not be used

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

audit trail

Into which of the following kinds of ports do external fingerprint readers plug?

USB

Which of the following can transmit germs?

hand geometry systems

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

digital forensics

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

information theft

Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

an encryption algorithm

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

they restore the files

Internet advertising firms often use which of the following to collect information about users web browsing habits?

spyware

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

clickjacking

Social engineering, as it pertains to computers, is _____________.

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Biometric Device

authenticates a person’s identity by translating a personal characteristic, such as fingerprint into digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic.

List biometric devices here

fingerprint reader, face recognition systems, hand geometry systems, voice verification systems, etc

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending