Digital Security Flashcards
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
B:encryption
Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.
D:brute force
Which of the following is not a characteristic of a weak password?
A:Eight characters in length and include one or more uppercase letters, numbers, and symbols.
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
C:password manager
If you use a password manager, what do you as the user need to remember?
B:The master password.
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
B:virus
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.
A:heuristic analysis
Once you have installed antivirus software, you don’t typically need to keep it running full time in the background
False
_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
A:DDoS
Correctly installed antivirus software will prevent all intrusions.
False
Which of the following would be considered spyware?
A:a keylogger
Social engineering attacks prey on human vulnerabilities.
True
Spam accounts for approximately ______ of all email.
D:70%
____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
B:Safe Browsing