UNIT 8 VOCAB Flashcards

1
Q

L2
Personally Identifiable Information

A

information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

L5
Phishing

A

a technique nat auempts to trick a user ito proviang personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

L5
Keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

L5
Malware

A

software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

L5
Rogue Access Point

A

a wireless access point that gives unauthorized access to secure networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

a process of encoding messages to keep them secret, so only
“authorized” parties can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Key Encryption

A

involves one key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public Key Encryption

A

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multifactor Authentication

A

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer Virus Scanning Software

A

protects a computing system against infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly