Which of the following terms is used to describe a program that hides inside a harmless or useful program but then gets out and does damage to your computer? |
Trojan horse |
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? |
decryption |
The term CAPTCHA is _____________. |
a series of distorted characters that a user is required to enter correctly to continue using a website |
The term firewall is _____________. |
hardware and/or software that protects a network’s resources from intrusion |
Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure? |
cyber extortionist |
What is the term for a website that uses encryption techniques to protect its data? |
secure site |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer? |
rootkit |
The term, zombie, is _____________. |
a computer whose owner doesn’t know that the computer or device is being controlled remotely by an outsider |
A __________ is an network of ______________. |
botnet/ zombies |
The term, payload, as it pertains to computer crime, is defined as _____________. |
the destructive event or prank the program is intended to deliver |
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information? |
phishing |
Storing back up files to a server that you get to by going across the Internet is called __________________. |
cloud back up |
Which of the following terms is used to describe a small text file that a web server stores on your computer? |
cookie |
In which particularly devastating type of DoS attack are multiple zombie computers used to attack multiple computer networks? |
distributed |
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? |
worm |
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission ? |
virus |
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? |
digital certificate |
In the world of computer security, a possessed object is ___________. |
a key, card or some other item that you must have with you to get access to a computer or a building |
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? |
malware |
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? |
digital security risk |
Which of the following best describes the term, cybercrime? |
online or internet-based illegal acts |
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? |
cyber-terrorist |
Which of the following has the same intent as a hacker, but does not have the technical skills and knowledge? Instead he has to find programs to use on the Internet. |
script kiddie |
What is the general term for programs that act without a user’s knowledge and deliberately delete data or change the way the computer runs? |
malware |
The term, botnet, means _____________. |
a group of zombie (controlled) computers connected to a network that attacks other networks |
What happens during a DDoS attack? |
A zombie army is used to attack computers or computer networks. |
The term back door, as it refers to computer crime, is _____________. |
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network |
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? |
spoofing |
What is an AUP intended to do? |
outline computer activities for which the computer and network may or may not be used |
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts? |
audit trail |
Into which of the following kinds of ports do external fingerprint readers plug? |
USB |
Which of the following can transmit germs? |
hand geometry systems |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? |
digital forensics |
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. |
information theft |
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? |
an encryption algorithm |
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? |
they restore the files |
Internet advertising firms often use which of the following to collect information about users web browsing habits? |
spyware |
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program? |
clickjacking |
Social engineering, as it pertains to computers, is _____________. |
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users |
Biometric Device |
authenticates a person’s identity by translating a personal characteristic, such as fingerprint into digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic. |
List biometric devices here |
fingerprint reader, face recognition systems, hand geometry systems, voice verification systems, etc |
5. chapter 5
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price