Unit 7 Vocab Flashcards

1
Q

A desktop computer or workstation that is capable of obtaining resources from a server

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

described characteristics of the culture of computers, information technology, and virtual reality

A

cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a person who conducts illegal activity using computers of other digital technology

A

cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a crime that involved a computer and network

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a set of moral, legal, and social principles that applied to computers relating to the user’s behavior

A

cyber ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the environment that allows digital technology of many forms to communicate with one another via the internet

A

cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the collection of security tool, policies, safeguard, and practices that protect the cyberspace environment and its occupants

A

cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the use of technology to attack a nation via network communications and computer devices

A

cyberwarfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a world wide collection of different networks connecting millions of devices which allows communication between other devices on the network

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a connection point that relays information along a distributed network

A

nodd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a process if arranging data into small units that can be transmitted over a digital network

A

packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a computer program or a device that provides sharable resources

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software that automatically displays or downloads advertising material (often unwanted) when a user is online

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

criminlas who break into computer netwroks and systems with malicious intent

A

Black Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software application that disguises itself as an innocent program of file, produces copies of itself and inserts into other software applications, and that when run performs a malicious action such as destroying data or damaging software

A

Computer Virus

17
Q

a standalone self-replicating software application that invades computers on a network and usually performs a destructive action

A

Computer Worm

18
Q

malicious attempts by hackers to damage, steal, or destroy a computer network or system

A

Cyberattacks

19
Q

a cyberattack in which the perpetrator seeks to make a machine or network resource unavaliable or to disrupt services connected to the Internet

A

Denial of Service Attack (DoS)

20
Q

occurs when an unauthorized user interceots a private communication, such as a phone call, instant message, video conference, or email

A

Eavesdropping

21
Q

an act of performing penetration tests on a system or network ro find loopholes and vulnerabilities that a malicious attacker might use to their advantage to cause loss or damages

A

Ethical Hacking

22
Q

an individual who may sometimes violate laws or ethical standards, but does not have the malicious intent typical of a black hat hacker

A

Gery Hat Hacker

23
Q

the act of using a computer to gain unauthorized access to data in a system

A

Hacking

24
Q

someone who uses a computer to gain unauthorized accesss to data in a system

A

Hacking

25
Q

someone who uses a computer to gain unauthorized acces to systems or networks

A

Hacker

26
Q

a tool that records or logs every keystroke on a computing device

A

Keylogger

27
Q

malicious software that attackers use to block access to a computer system until the user pays a certain amount of money

A

Ransomware

28
Q

the practice of sending fraudulent emails or text messages posing as a legitimate source in order to deveive individuals into revealing personal information, such as passwords and credit card numbers

A

Phinishing

29
Q

occurs when an unauthorized user takes over an active communication session without the user’s permission

A

Session Hijacking

30
Q
A