module 5# Flashcards

study

1
Q

A digital security risk

A

is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A digital detox

A

is a period of time during which an individual refrains from using technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term, cyberwarfare

A

describes an attack whose goal ranges from disabling a government’s computer network to crippling a country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data mining

A

is the process of sifting through Big Data to find the important questions that will yield fruitful results. These attackers try to steal and then use your credit card numbers, online financial account information, or Social Security numbers using data mining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyber extortionist

A

is an individual who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social engineering

A

is a category of attack that attempts to trick the victim into giving valuable information to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Creative Commons

A

is another source for finding content that may or may not be used, along with any restrictions or payment needed to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intellectual property rights

A

are the rights to which creators are entitled to their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

and access controls protect data and information on computers and other devices For most computer users, the greatest risk comes from attackers who want to steal their information for their own financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The computer, device, or network should maintain an audit trail

A

that records access attempts, both successful and unsuccessful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A proxy server

A

is a server outside the organization’s network that controls which communications pass in and out of the organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization’s acceptable use policy (AUP)

A

should specify the acceptable use of technology by employees for personal reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A CAPTCHA

A

is a program developed at Carnegie Mellon University that displays an image containing a series of distorted characters to identify and enter to verify that user input is from humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly