Ch 10 Flashcards

1
Q

a serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is

A

cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what redirects you to a phony website even if you type the correct address into your browser

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what occurs when someone fraudulently uses your name, SSN, or bank or credit card number

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is an unlawful attack against computers or networks thats done to intimidate a government or its people for a political or social agenda

A

cyberterriorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so

A

a data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ____ is a form of malware that changes your home page and redirects you to other websites

A

browser hijacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a ____ sends out so much traffic that it could cripple a server or network

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the ____ is encrypted and hidden and only accessible using the TOR browser to view it anonymously and securely

A

deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a security feature of a router that shields the devices on a private network from the public network (the Internet)

A

network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what makes it a crime to access classified info

A

comp fraud and abuse act of 1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

where can you file a cyber crime report

A

internet crime complaint center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what forces users to practice safe computing and prevent a lot of potential problems from affecting the system

A

acceptable user policy AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an attack that occurs on the day an exploit is discovered before the publisher of the compromised software can fix it

A

zero day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a large planned update that addresses multiple problems or adds multiple features

A

service pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what addresses individual problem as they are discovered

A

patch/hotfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what converts unencrypted, plain text, into code called cipertext

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what will notify you before changes are made to your comp

A

user account control UAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what uses a push button, PIN< or USB key to auto configure devices to connect to your network

A

wifi protected setup WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what adds security to a wireless network by encrypting transmitted data

A

wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the wireless network name

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a device that connects 2 or more networks together

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what acts like a firewall by preventing unauthorized access to your network

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are packages of security software that include a combination of features such as antivirus, firewall, and privacy protection

A

security suites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is an advantage of security suites

A

complete protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is an disadvantage of security suites

A

expenisve and may use a lot of system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what prevents adware and spy ware software from installing itself on your comp and can be used to clean an infected macine

A

antispyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what provides protection against more than just viruses but also protects against Trojans, worms, and spyware

A

antivirus programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

software firewall also blocks access to

A

an individual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is a hardware device that blocks unauthorized access to your network

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what happens when you visit a web site that installs a program in he background without your knowledge

A

drive by download

31
Q

what is an anonymous digital currency

A

bitcoin

32
Q

what prevents you from using your comp until you pay a fine or fee

A

ransomware

33
Q

what is a set of programs that enables someone to gain control over a comp system while hiding the fact the the comp has been compromised

A

root kit

34
Q

what is a program that appears to be a legitimate program but is instead something maliciou

A

trojan horse

35
Q

what is an attack perpetrated by sending out so much traffic that it cripples a server or network

A

denial of service attack

36
Q

what is a network of infected comp zombies or bots that are compelled by a master

A

botnet

37
Q

what’s is self replication but it doesnt need a host to travel virtually

A

worm

38
Q

what behaves like a virus but it doesn’t spread to the other machines

A

logic bomb

39
Q

when a logic bomb has a specific trigger date it is called a

A

time bomb

40
Q

what attack may corrupt of delete files or it may erase an entire disk

A

payload attack

41
Q

what is a program that replicates itself and infects comps

A

virus

42
Q

a browser hijacker can changes you home

A

page and redirects you to other websites

43
Q

spyware secretly

A

gathers personal info about you

44
Q

adware shows you

A

ads

45
Q

what are small text files that websites use to identify you when you return

A

cookies

46
Q

what is malicious software

A

malware

47
Q

what items can only be purchased using cryptocurrency

A

items from the darknet markets

48
Q

what is a subset of the deep web

A

dark web

49
Q

what browser do you need to use to access the darkweb

A

TOR

50
Q

what systems that require you to pay for access to content

A

paywalls

51
Q

how much of the web that is the deep web is unindexed

A

96%

52
Q

what percentage of the clear web is indexed

A

4%

53
Q

what is an unlawful attack on comps or networks done to intimidate a govt or its people for a political or social agenda

A

cyberterrorism

54
Q

what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so

A

data breach

55
Q

what is hacking to make a political statement

A

hactktivism

56
Q

who hack into systems illegally but not with malicious intent

A

gray hat hackers

57
Q

who hacks into systems for malicious purposes

A

black hat hackers

58
Q

what are security experts that are paid to hack systems

A

sneakers
white hat hackers

59
Q

white hat hackers are motivated to find

A

security holes in a system to prevent future hacking

60
Q

what are programs or devices that capture what is typed on a keyboard

A

keyloggers

61
Q

when someone fraudulently uses your name, SSN, or bank or credit card numbers is called

A

identity theft

62
Q

fake bidding by the seller or an accomplice to drive up the price of an auction item is called

A

shill bidding

63
Q

when users share posts without clicking them first which can foal you into believing the links are safe is called

A

share bidding

64
Q

what is a link that teases you with just enough info to get you to click the link, driving traffic to a webpage

A

click bait

65
Q

when clicking on a link allows malware to post unwanted links on your page is called

A

click jacking

66
Q

when someone convices a victim to voluntarily and knowingly give money or property to another person is called

A

comp fraud

67
Q

what redirects you to a phony website by hijacking the domain name of a company or poisoning the DNS server references to a site

A

pharming

68
Q

what uses email messages or IMs that appear to be from those you do business with

A

phising

69
Q

when a stalker demonstrates a pattern for harassment that poses a credible threat or harm online is called

A

cyberstalking

70
Q

exchanges between adults that are malicious in intent is called

A

cyber harrassment

71
Q

exchanges of malicious intent between minors is called

A

cyber bullyin

72
Q

cybercrime refers to

A

criminal activity on the internet

73
Q

personal cybercrime is against

A

individuals not businesses