Terms Flashcards

1
Q

A computer that is under the control of a hacker without the owner’s knowledge. Relatively benign. Cripple websites by flooding them with information.

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standalone programming that doesn’t need to copy itself to a host or require human interaction to spread. Self replicating malware that duplicates itself to spread to uninflected computers.

A

Worm virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A file object that is placed on a web page or in an email message to monitor user behavior. Unlike a cookie, it does not require the user’s permission. Can be detected by looking at the source version of the page to find a tag that loads from a different server than the rest of the page.

A

Web bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Driving around with a laptop to find unsecured wireless LANs to gain free web service or illegal access to an organization’s data.

A

War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious code that copies itself to another program, boot sector, or document and changes how a computer performs.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Autonomously performs actions such as tweeting, retweeting, liking, etc.

A

Twitter bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malicious program is hidden in an innocent looking email attachment or free game. Unlike a true virus, it cannot replicate itself.

A

Trojan horse virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of the most recent web pages and files downloaded from the web. The files are stored in a folder cache so subsequent requests are retrieved from a local hard disk. When the user requests the same page, a request is sent to the website for the date. If it is newer than what is stored, a new page is downloaded. If not, it loads from the hard drive.

A

Temporary internet files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spies on your computer. Can capture information like web browsing habits, email messages, usernames and passwords, and credit card information.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tricking or deceiving computer systems or other computer users. Done by hiding one’s identity or faking the identity of another us on the web.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unsolicited bulk mail messages sent through email.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Also known as rogue security software. Uses fake error messages to lure you into buying a software program.

A

Scare ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hardware device that routes data from a local area network to another network connection.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collection of computer software, typically malicious, designed to allow access to areas of its software that would otherwise not be allowed.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gaining access to the lowest level of an operating system.

A

Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also called an evil twin. A fraudulent wifi access point that appears to be legitimate set up to eavesdrop on wireless communications. The wireless LAN equivalent to phishing.

A

Rogue wifi hotspots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Functions as malevolent software that blocks victims access to computer and demand a ransom be paid.

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Gaining access to a communications channel by using the connection another user already established.

A

Piggybacking

19
Q

The attacker tries to learn information such as login or account information by masquerading as a reputable entity or person.

A

Phishing

20
Q

Malicious code is installed on a computer, misdirecting users to fraudulent websites without their knowledge or consent.

A

Pharming

21
Q

Malicious software, is a program or file that is harmful to a computer user.

A

Malware

22
Q

Infect Word and causes a sequence of actions to be performed automatically. Relatively harmless. Random text inserted.

A

Macro virus

23
Q

Also called slag code. Delayed action virus or Trojan horse.

A

Logic bomb

24
Q

The action of recording or logging the keys struck on a keyboard, so that the person using the keyboard is unaware of it.

A

Keystone loggers

25
Q

To remove a restricted mode of operation. May enable content with didn’t allow rights to be used on any computer or third party systems to be run on a mobile device.

A

Jail breaking

26
Q

Stealing the identity of others

A

Identity theft

27
Q

The output netcdf dataset that the model produces to record the model simulation field with time

A

History files

28
Q

The gaining of access (wanted or unwanted) to a computer and viewing, copying, or creating data (leaving a trace), non maliciously

A

Hacking

29
Q

Used to refer to someone who can gain unauthorized access to other computers.

A

Hacker

30
Q

Rules to control incoming and outgoing network traffic, network security system. Acts as a barrier between a trusted network and an untrusted one.

A

Firewall

31
Q

Criminal activity done using computers and the internet.

A

Cyber crime

32
Q

A small amount of data generated by a website and saved by your browser. Store login information.

A

Cookies

33
Q

A feature of the windows operating system that allows the user to modify system settings and controls.

A

Control panel

34
Q

An exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.

A

Clickjacking

35
Q

A group of computers that are controlled from a single source. Usually refers to computers that are affected with malware.

A

Botnet

36
Q

Used for short range connections. Based on radio waves. Objects won’t disrupt it.

A

Bluetooth

37
Q

Uses certificates to authenticate the user and network

A

Transport layer security

38
Q

Wifi protected access 2. Technical term for a network name.

A

Wpa2

39
Q

Wifi. Network that provides connectivity to wireless devices in a limited geographic area.

A

WLAN

40
Q

Private telecommunications network that interconnects multiple LANs.

A

WAN

41
Q

Allows USB drive to be used as memory

A

Ready boost

42
Q

Random access memory. Small memory chips. Faster than reading from hard drive.

A

RAM

43
Q

Instructions per second in megahertz the computer executes.

A

Processor speed