Chapter 5 Notes Pt. 1 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

a group of compromised computers or mobile devices connected to a network

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A botnet composed computer or device is known as a ________

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services

A

denial of service attack (DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a program or set of instructions in a program that allow users to bypass security controls

A

back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a technique intrudes use to make their network or Internet transmission appear legitimate

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hardware and/or software that protects a network resources form intrusion

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between unauthorized access and unauthorized use?

A

unauthorized access- the use of a computer or network without permission

unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection

A

file
printer
sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a security measure that defines who can access a computer, device, or network

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control defines:

A

(1) who can access a computer
(2) when they can access it
(3) what actions can be taken while accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a unique combination of characters that identifies one specific user

A

user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a private combination of characters associated with the user name that allows access to certain computer resources

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___________ ________ is any item that you can, to gain access to a computer or computer facility

A

posessed object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A posessed object can often be used in combination with a ____ (_________ ____________ _________)

A

PIN (personal identification number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

authenticates a person’s identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the discovery, collection, and analysis of evidence found on computers and networks

A

digital forensics

17
Q

Software theft occurs when resources:

A

(1) steals software media
(2) inetionally erases programs
(3) illegally registers and/or activites a program
(4) illegally copies a program

18
Q

A single-user license agreement typically contains the followign conditions:
You can:

A

(1) install the software on only one computer
(2) make one copy of the software as a backup
(3) give or sell the software to another individual, but only if the software is removed from the user’s computer first

19
Q

A single-user license agreement typically contains the followign conditions:
You cannot:

A

(1) install the software on a network’s software
(2) export the software
(3) rent or lease the software
(4) give copies to friends and colleagues, while continuing software

20
Q

What are the common types of malware?

A

(1) virus
(2) worm
(3) trojan horse
(4) rootkit
(5) spyware
(6) adware

21
Q

Which type of malware is this:
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission

A

virus

22
Q

Which type of malware is this:

a program that copies itself repeatedly, using up resources and possibly shurring down the computer, device, or network

A

worm

23
Q

Which type of malware is this:

a program that hides within or looks like a legitimate program.

A

trojan horse

24
Q

Which type of malware is this:
a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

A

rootkit

25
Q

Which type of malware is this:
a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source whiel the user is online

A

spyware

26
Q

Which type of malware is this:
a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services

A

adware

27
Q

True or False: A trojan horse can replicate itself

A

False; unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices

28
Q

occurs when someone steals personal or confidential information

A

information theft

29
Q

a process of converting data that is readable by humans into encoded characters to prevent unauthorized access

A

encryption

30
Q

a notice that guarantees a user or a website is legitimate

A

digital certificate

31
Q

a website that uses encryption techniques to secure its data is known as a _______ _____

A

secure site

32
Q

What is the difference of hardware theft and hardware vandalism?

A

Hardware theft- the act of stealing digital equipment

Hardware vandalism- the act of defacing or destroying digital equipment

33
Q

To help reduce the chance of theft, companies and schools use a variety of ________ __________

A

security measures

34
Q

List hardware theft and vandalism safeguards.

A

(1) physical access controls
(2) alarm system
(3) physical security devices
(4) device-tracking app

35
Q

List hardware failured safeguards.

A

(1) surge protector
(2) uninterruptible power supply (UPS)
(3) duplicate components or duplicate computers
(4) fault-tolerant computer