Ch 10 Flashcards

(73 cards)

1
Q

a serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is

A

cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what redirects you to a phony website even if you type the correct address into your browser

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what occurs when someone fraudulently uses your name, SSN, or bank or credit card number

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is an unlawful attack against computers or networks thats done to intimidate a government or its people for a political or social agenda

A

cyberterriorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so

A

a data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ____ is a form of malware that changes your home page and redirects you to other websites

A

browser hijacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a ____ sends out so much traffic that it could cripple a server or network

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the ____ is encrypted and hidden and only accessible using the TOR browser to view it anonymously and securely

A

deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a security feature of a router that shields the devices on a private network from the public network (the Internet)

A

network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what makes it a crime to access classified info

A

comp fraud and abuse act of 1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

where can you file a cyber crime report

A

internet crime complaint center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what forces users to practice safe computing and prevent a lot of potential problems from affecting the system

A

acceptable user policy AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an attack that occurs on the day an exploit is discovered before the publisher of the compromised software can fix it

A

zero day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a large planned update that addresses multiple problems or adds multiple features

A

service pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what addresses individual problem as they are discovered

A

patch/hotfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what converts unencrypted, plain text, into code called cipertext

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what will notify you before changes are made to your comp

A

user account control UAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what uses a push button, PIN< or USB key to auto configure devices to connect to your network

A

wifi protected setup WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what adds security to a wireless network by encrypting transmitted data

A

wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the wireless network name

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a device that connects 2 or more networks together

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what acts like a firewall by preventing unauthorized access to your network

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are packages of security software that include a combination of features such as antivirus, firewall, and privacy protection

A

security suites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is an advantage of security suites

A

complete protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is an disadvantage of security suites
expenisve and may use a lot of system resources
26
what prevents adware and spy ware software from installing itself on your comp and can be used to clean an infected macine
antispyware software
27
what provides protection against more than just viruses but also protects against Trojans, worms, and spyware
antivirus programs
28
software firewall also blocks access to
an individual machine
29
what is a hardware device that blocks unauthorized access to your network
firewall
30
what happens when you visit a web site that installs a program in he background without your knowledge
drive by download
31
what is an anonymous digital currency
bitcoin
32
what prevents you from using your comp until you pay a fine or fee
ransomware
33
what is a set of programs that enables someone to gain control over a comp system while hiding the fact the the comp has been compromised
root kit
34
what is a program that appears to be a legitimate program but is instead something maliciou
trojan horse
35
what is an attack perpetrated by sending out so much traffic that it cripples a server or network
denial of service attack
36
what is a network of infected comp zombies or bots that are compelled by a master
botnet
37
what's is self replication but it doesnt need a host to travel virtually
worm
38
what behaves like a virus but it doesn't spread to the other machines
logic bomb
39
when a logic bomb has a specific trigger date it is called a
time bomb
40
what attack may corrupt of delete files or it may erase an entire disk
payload attack
41
what is a program that replicates itself and infects comps
virus
42
a browser hijacker can changes you home
page and redirects you to other websites
43
spyware secretly
gathers personal info about you
44
adware shows you
ads
45
what are small text files that websites use to identify you when you return
cookies
46
what is malicious software
malware
47
what items can only be purchased using cryptocurrency
items from the darknet markets
48
what is a subset of the deep web
dark web
49
what browser do you need to use to access the darkweb
TOR
50
what systems that require you to pay for access to content
paywalls
51
how much of the web that is the deep web is unindexed
96%
52
what percentage of the clear web is indexed
4%
53
what is an unlawful attack on comps or networks done to intimidate a govt or its people for a political or social agenda
cyberterrorism
54
what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so
data breach
55
what is hacking to make a political statement
hactktivism
56
who hack into systems illegally but not with malicious intent
gray hat hackers
57
who hacks into systems for malicious purposes
black hat hackers
58
what are security experts that are paid to hack systems
sneakers white hat hackers
59
white hat hackers are motivated to find
security holes in a system to prevent future hacking
60
what are programs or devices that capture what is typed on a keyboard
keyloggers
61
when someone fraudulently uses your name, SSN, or bank or credit card numbers is called
identity theft
62
fake bidding by the seller or an accomplice to drive up the price of an auction item is called
shill bidding
63
when users share posts without clicking them first which can foal you into believing the links are safe is called
share bidding
64
what is a link that teases you with just enough info to get you to click the link, driving traffic to a webpage
click bait
65
when clicking on a link allows malware to post unwanted links on your page is called
click jacking
66
when someone convices a victim to voluntarily and knowingly give money or property to another person is called
comp fraud
67
what redirects you to a phony website by hijacking the domain name of a company or poisoning the DNS server references to a site
pharming
68
what uses email messages or IMs that appear to be from those you do business with
phising
69
when a stalker demonstrates a pattern for harassment that poses a credible threat or harm online is called
cyberstalking
70
exchanges between adults that are malicious in intent is called
cyber harrassment
71
exchanges of malicious intent between minors is called
cyber bullyin
72
cybercrime refers to
criminal activity on the internet
73
personal cybercrime is against
individuals not businesses