IS3445 CHAP 5 MITIGATING RISK WHEN CONNECTING TO THE INTERNET Flashcards
___ is any software application where advertising banners are displayed while the program is running.
Adware
___ is an agreement that outlines what can and cannot be done with the personal data of visitors to a Web site.
Client privacy agreement
___ is a cybercriminal intending harm to systems and networks.
Cracker
___ is constant and unwelcome electronic tracking of another person.
Cyberstalking
___ is an organized, hierarchical division of DNS names.
DNS namespace
___ is a hierarchical system for naming resources on a network as well as providing translation between the resource’s IP address and its domain name.
(DNS) Domain Name System
___ is the process of identifying potentially risky email and stopping it from reaching the end user.
Email filtering
___ is assuming the online identity of a person.
Identify theft
___ is a security mechanism that monitors data packets traveling across a network, comparing traffic against parameters of known threats. It is a passive security measure in that it only monitors the network and odes’t take steps to mitigate the risk.
(IDS) Intrusion detection system
___ is a security mechanism that monitors and reacts to data packets traveling across a network. It is an active security measure because it not only monitors but also blocks suspect traffic identified by the device.
(IPS) Intrusion prevention system
___ is designed to infect, corrupt, and damage Microsoft Office documents.
Macro virus
___ is an illegitimate announcement of new malware.
Malware hoax
___ is a form of malware that covertly gathers system information through the user’s Internet connection without his or her knowledge.
Spyware
- Worms are able to self-replicate.
TRUE OR FALSE
TRUE
- You have created a Web site and need to increase visitor trust. Which of the following methods are used to build trust? Select two.
- Logos
- Testimonials
- Color choice
- Font size
Logos
Testimonials