Unit 7 Vocab Flashcards

1
Q

A desktop computer or workstation that is capable of obtaining resources from a server

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

described characteristics of the culture of computers, information technology, and virtual reality

A

cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a person who conducts illegal activity using computers of other digital technology

A

cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a crime that involved a computer and network

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a set of moral, legal, and social principles that applied to computers relating to the user’s behavior

A

cyber ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the environment that allows digital technology of many forms to communicate with one another via the internet

A

cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the collection of security tool, policies, safeguard, and practices that protect the cyberspace environment and its occupants

A

cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the use of technology to attack a nation via network communications and computer devices

A

cyberwarfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a world wide collection of different networks connecting millions of devices which allows communication between other devices on the network

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a channel that links computers, servers, network devices, peripherals, or other devices together to allow the sharing of data

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a connection point that relays information along a distributed network

A

nodd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a process if arranging data into small units that can be transmitted over a digital network

A

packet switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a computer program or a device that provides sharable resources

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software that automatically displays or downloads advertising material (often unwanted) when a user is online

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

criminlas who break into computer netwroks and systems with malicious intent

A

Black Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

software application that disguises itself as an innocent program of file, produces copies of itself and inserts into other software applications, and that when run performs a malicious action such as destroying data or damaging software

A

Computer Virus

17
Q

a standalone self-replicating software application that invades computers on a network and usually performs a destructive action

A

Computer Worm

18
Q

malicious attempts by hackers to damage, steal, or destroy a computer network or system

A

Cyberattacks

19
Q

a cyberattack in which the perpetrator seeks to make a machine or network resource unavaliable or to disrupt services connected to the Internet

A

Denial of Service Attack (DoS)

20
Q

occurs when an unauthorized user interceots a private communication, such as a phone call, instant message, video conference, or email

A

Eavesdropping

21
Q

an act of performing penetration tests on a system or network ro find loopholes and vulnerabilities that a malicious attacker might use to their advantage to cause loss or damages

A

Ethical Hacking

22
Q

an individual who may sometimes violate laws or ethical standards, but does not have the malicious intent typical of a black hat hacker

A

Gery Hat Hacker

23
Q

the act of using a computer to gain unauthorized access to data in a system

24
Q

someone who uses a computer to gain unauthorized accesss to data in a system

25
someone who uses a computer to gain unauthorized acces to systems or networks
Hacker
26
a tool that records or logs every keystroke on a computing device
Keylogger
27
malicious software that attackers use to block access to a computer system until the user pays a certain amount of money
Ransomware
28
the practice of sending fraudulent emails or text messages posing as a legitimate source in order to deveive individuals into revealing personal information, such as passwords and credit card numbers
Phinishing
29
occurs when an unauthorized user takes over an active communication session without the user's permission
Session Hijacking
30