Module 9 Flashcards

1
Q

computer virus

A

a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denial of service (DoS) attack

A

An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dot con

A

A fraud or scam carried out through the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

encryption

A

A method of scrambling electronic content to make it unreadable if it is intercepted by an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

firewall

A

A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hacking

A

Using a computer to break into a computing resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

identity theft

A

Using someone else’s identity to purchase goods or services or otherwise illegally masquerade as that individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

phishing

A

The use of spoofed electronic communications (typically e-mail messages) to obtain credit card numbers and other personal data to be used for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trojan horse

A

A malicious program that masquerades as something else, usually an application program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uninterruptible power supply (UPS)

A

A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer crime

A

aka cybercrime; any illegal act involving a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

information privacy

A

the rights of individuals and companies to control how the information about them is collected and used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hardware theft

A

hardware stolen from an individual, business, school, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

system failure

A

the complete malfunction of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

full disk encryption (FDE)

A

automatically encrypts everything stored on a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ruggedized devices

A

withstand much more physical abuse than a conventional computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

surge suppressors

A

protect hardware from damage due to electrical fluctuations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disaster recovery plan (business continuity plan)

A

indicates how an organization will recover from a disruptive event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unauthorized access

A

gaining access to a computer, network, file, or other resource without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

unauthorized use

A

using a computer resource for unapproved activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

war driving

A

driving around an area to find a Wi-Fi network to access and use without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

wifi piggybacking

A

accessing a unsecured Wi-Fi network from the hacker’s current location without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

possessed knowledge access systems

A

use information that only the authorized user should know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

biometric access systems

A

identifies users by a particular, unique biological characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two-factor authentication

A

uses two different methods to authenticate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Private key encryption (symmetric key encryption)

A

uses one key; most often used to encrypt files on a computer; if used to send files to others, the recipient and sender must agree on private key to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Public key encryption (asymmetric key encryption)

A

uses two keys (private and public) to encrypt and decrypt documents; public key encrypts, private key decrypts; obtained via a certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

computer sabotage

A

acts of malicious destruction to a computer or computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Passwords

A

the most common type of possessed knowledge

30
Q

possessed object access systems

A

use a physical object an individual has in his/her possession to identify that individual

31
Q

secure web page

A

uses encryption to protect information transmitted via that web page

32
Q

botnet

A

group of bots (computers controlled by hacker) that are controlled by one individual and work together in a coordinated fashion

33
Q

malware

A

any type of malicious software

34
Q

computer worm

A

malicious program designed to spread rapidly by sending copies of itself to other computers via a network

35
Q

security software

A

typically a suite of programs used to protect your computer from a variety of threats

36
Q

antivirus software

A

used to detect and eliminate computer viruses and other types of malware

37
Q

social media hacking

A

accessing someone else’s social media account to post comments or send messages as that individual

38
Q

pharming

A

the use of spoofed domain names to obtain personal information

39
Q

online auction fraud

A

when an item purchased through an online auction is never delivered or is not as specified

40
Q

digital ID (digital certificate)

A

group of electronic data that can be used to verify the identify of a person or organization

41
Q

digital signature

A

verifies the identity of the individual and guarantees that the document has not been changed

42
Q

cyber bullying

A

use of online communication to bully another person

43
Q

cyber stalking

A

repeated threats or other malicious behavior that poses a credible threat of harm carried out online

44
Q

marketing database

A

contains marketing and demographic data; where people live and what products they buy

45
Q

government databases

A

a collection of data about people that the government collects and maintains

46
Q

electronic profiling

A

collecting in-depth information about an individual; name; address; income; and buying habits

47
Q

privacy policy

A

explains how personal information is used and shared; on most business websites

48
Q

spam

A

unsolicited email sent to a large group of individuals at one time

49
Q

throw-away email address

A

use for activities that lead to junk email

50
Q

email filter/spam filter

A

used to sort email

51
Q

computer monitoring software

A

used to monitor someone’s computer activity; can block websites, notify designated party of specific keyword searches or use of inappropriate web sites, can record emails and documents before they are encrypted

52
Q

video surveillance

A

use of video cameras to monitor activities

53
Q

employee monitoring

A

recording or observing the actions of employees while on the job

54
Q

presence technology

A

ability of one computing device to identify another device on the same network and determine its status

55
Q

T/F: A computer virus can only be transferred to another computer via a storage medium.

A

false

56
Q

T/F: An access control system that uses passwords is a possessed knowledge access system.

A

true

57
Q

T/F: Using a password that is two characters long is an example of two-factor authentication.

A

false

58
Q

T/F: Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.

A

true

59
Q

T/F: Cyberstalking is the use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes.

A

false

60
Q

Driving around looking for a Wi-Fi network to access is referred to as____ .

A

war driving

61
Q

_____ access control systems use some type of unique physical characteristic of a person to authenticate that individual.

A

Biometric

62
Q

A(n) _____ plan can help a business get operational again following a fire, an act of sabotage, or a similar disaster.

A

disaster recovery or business continuity

63
Q

A(n) _____ can be added to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed.

A

digital signature

64
Q

Many businesses today are requiring that all portable computers and mobile-devices issued to employees be ____ in order to protect against a data breach if the device is lost or stolen.

a. ruggedized
b. encrypted
c. formatted

A

b. encrypted

65
Q

True or False: The act of breaking into another computer system is called two-factor authentication.

A

false

66
Q

A(n) __________ creates a barrier between a computer and the Internet to protect against unauthorized access.

A

firewall

67
Q

Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called __________.

a. hacking
b. spamming
c. phishing

A

c. phishing

68
Q

True or False: Cyber stalking can lead to online stalking and sometimes even the death of the victim.

A

true

69
Q

Using someone else’s identity to purchase goods or services or perform other transactions is called __________.

A

identity theft

70
Q

The ability of a computing device to identify another device on the same network and determine its status is called __________.

a. computer monitoring
b. video surveillance
c. presence technology

A

c. presence technology

71
Q

True or False: A throw-away e-mail can help to reduce spam.

A

True

72
Q

A tool that automatically sorts incoming e-mail messages based on specified criteria is a(n) __________.

A

email filter