Podcast
Questions and Answers
What type of software is adware?
What type of software is adware?
What is the purpose of antivirus software?
What is the purpose of antivirus software?
To prevent, detect, and remove malicious software.
What is a backdoor program?
What is a backdoor program?
A means of access that bypasses security mechanisms.
What is the purpose of making a backup?
What is the purpose of making a backup?
Signup and view all the answers
What does biometric authentication measure?
What does biometric authentication measure?
Signup and view all the answers
What defines a black-hat hacker?
What defines a black-hat hacker?
Signup and view all the answers
What is a boot-sector virus?
What is a boot-sector virus?
Signup and view all the answers
What is a botnet?
What is a botnet?
Signup and view all the answers
What does computer forensics involve?
What does computer forensics involve?
Signup and view all the answers
Define a cookie in web context.
Define a cookie in web context.
Signup and view all the answers
What is cyberloafing?
What is cyberloafing?
Signup and view all the answers
What constitutes a data breach?
What constitutes a data breach?
Signup and view all the answers
What is a denial-of-service attack?
What is a denial-of-service attack?
Signup and view all the answers
What does a distributed denial-of-service attack involve?
What does a distributed denial-of-service attack involve?
Signup and view all the answers
What is a drive-by download?
What is a drive-by download?
Signup and view all the answers
How does an e-mail virus work?
How does an e-mail virus work?
Signup and view all the answers
What is an encryption virus?
What is an encryption virus?
Signup and view all the answers
What do exploit kits do?
What do exploit kits do?
Signup and view all the answers
What function does a firewall serve?
What function does a firewall serve?
Signup and view all the answers
What does a geotag do?
What does a geotag do?
Signup and view all the answers
Define a grey-hat hacker.
Define a grey-hat hacker.
Signup and view all the answers
What is identity theft?
What is identity theft?
Signup and view all the answers
What is an image backup?
What is an image backup?
Signup and view all the answers
What is an incremental backup?
What is an incremental backup?
Signup and view all the answers
What is a keystroke logger?
What is a keystroke logger?
Signup and view all the answers
What is logical port blocking?
What is logical port blocking?
Signup and view all the answers
What is a logic bomb?
What is a logic bomb?
Signup and view all the answers
How does malware function?
How does malware function?
Signup and view all the answers
What is the Master Boot Record?
What is the Master Boot Record?
Signup and view all the answers
Define multi-factor authentication.
Define multi-factor authentication.
Signup and view all the answers
What is a multipartite virus?
What is a multipartite virus?
Signup and view all the answers
What does network address translation do?
What does network address translation do?
Signup and view all the answers
What is a packet analyzer?
What is a packet analyzer?
Signup and view all the answers
What does packet filtering do?
What does packet filtering do?
Signup and view all the answers
Define a personal firewall.
Define a personal firewall.
Signup and view all the answers
What is pharming?
What is pharming?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What characterizes a polymorphic virus?
What characterizes a polymorphic virus?
Signup and view all the answers
What does pretexting involve?
What does pretexting involve?
Signup and view all the answers
What are program files?
What are program files?
Signup and view all the answers
What is quarantining in antivirus software?
What is quarantining in antivirus software?
Signup and view all the answers
What is a rootkit?
What is a rootkit?
Signup and view all the answers
What is scareware?
What is scareware?
Signup and view all the answers
Define a script in programming.
Define a script in programming.
Signup and view all the answers
What is social engineering?
What is social engineering?
Signup and view all the answers
What is spam?
What is spam?
Signup and view all the answers
What does a spam filter do?
What does a spam filter do?
Signup and view all the answers
What is spear phishing?
What is spear phishing?
Signup and view all the answers
What is spyware?
What is spyware?
Signup and view all the answers
What is a stealth virus?
What is a stealth virus?
Signup and view all the answers
What is a surge protector?
What is a surge protector?
Signup and view all the answers
What is a time bomb in software?
What is a time bomb in software?
Signup and view all the answers
What is a trojan horse in computer security?
What is a trojan horse in computer security?
Signup and view all the answers
What is a virtual private network?
What is a virtual private network?
Signup and view all the answers
What is a virus?
What is a virus?
Signup and view all the answers
Define a virus signature.
Define a virus signature.
Signup and view all the answers
What characterizes a white-hat hacker?
What characterizes a white-hat hacker?
Signup and view all the answers
What is a whole-house surge protector?
What is a whole-house surge protector?
Signup and view all the answers
What is a worm in cybersecurity?
What is a worm in cybersecurity?
Signup and view all the answers
What defines a zombie computer?
What defines a zombie computer?
Signup and view all the answers
Study Notes
Adware
- Software that automatically displays or downloads unwanted advertising content when online.
Antivirus Program
- Computer software used to prevent, detect, and remove malicious software, initially focused on viruses.
Backdoor Program
- Method of bypassing security to access a computer program, can be used for legitimate troubleshooting or by attackers.
Backup
- Procedure for creating extra copies of data to prevent loss or damage.
Biometric Authentication Device
- Validates user identity through intrinsic characteristics like fingerprints, retinal scans, or voice patterns.
Black-Hat Hacker
- Expert in computer systems who breaches internet security for malicious purposes, also known as a cracker.
Boot-Sector Virus
- Type of virus infecting the boot sector of floppy disks or Master Boot Record (MBR) of hard disks.
Botnet
- Network of infected private computers controlled remotely, often for spamming.
Computer Forensics
- Practice of collecting and analyzing digital data for legal purposes, useful in crime detection and resolution.
Cookie
- Small text file created by websites to recognize users and track preferences, stored temporarily or permanently.
Cyberloafing
- Employees using workplace internet for personal activities while feigning legitimate work engagement.
Data Breach
- Security incident where sensitive data is accessed or used by unauthorized individuals.
Data File
- A file that consists of sensitive, protected, or confidential information, subject to data breaches.
Denial-of-Service Attack
- Attack designed to overwhelm network resources, often through excessive traffic, leads to service disruption.
Distributed Denial of Service Attack
- Involves multiple compromised systems attacking a single target, flooding it with traffic.
Drive-by Download
- Automatic download of software without user consent, often malicious in nature.
E-mail Virus
- Virus that spreads via email attachments, activated when the file is opened.
Encryption Virus
- Virus using encryption techniques to obscure its code from detection.
Exploit Kits
- Malicious toolkits aimed at exploiting software vulnerabilities to spread malware.
Firewall
- Security system controlling incoming and outgoing network traffic, blocks unauthorized access.
Geotag
- Electronic tag assigning geographical coordinates to digital content such as photos or social media posts.
Grey-Hat Hacker
- Hacker who may violate laws but lacks malicious intent, operating outside ethical boundaries for various motives.
Hacker
- Individual who unlawfully accesses computer data or networks.
Identity Theft
- Fraudulent acquisition and use of someone’s private information, often for financial purposes.
Image Backup
- Backup method that creates a copy of the operating system and all associated data as a single image file.
Incremental Backup
- Backup type capturing only the changes made since the last full backup.
Inoculation
- Process of introducing substances to produce immunity against diseases.
Keystroke Logger
- Surveillance software recording every keystroke made on a keyboard to capture sensitive information.
Logical Port
- Endpoint of a logical connection in TCP/IP and UDP networks, used for specifying server programs.
Logical Port Blocking
- Technique to secure a computer by preventing unauthorized access through specific network ports.
Logic Bomb
- Secretly embedded code that executes harmful instructions when triggered by certain conditions.
Macro Virus
- Virus that affects applications like Microsoft Word, automating actions once the application is triggered.
Malware
- General term for software designed to harm or disable computers and systems.
Master Boot Record
- Information in the first sector of a disk that initiates the booting of the operating system.
Multi-Factor Authentication
- Access control method requiring multiple forms of evidence for authentication.
Multipartite Virus
- Virus that spreads in multiple ways, with capabilities of infecting various parts of a system.
Network Address Translation
- Process modifying network address information in IP packet headers for routing.
Packet Analyzer
- Tool for intercepting and logging network traffic, assisting in analysis of classes of data.
Packet Filtering
- Firewall technique for regulating network access based on specific criteria like IP addresses and ports.
Personal Firewall
- Software protecting an individual computer from unauthorized access over the Internet.
Pharming
- Redirection of website traffic to malicious sites, exploiting vulnerabilities or altering hosts files.
Phishing
- Online scam targeting account holders to extract financial or personal information under false pretense.
Polymorphic Virus
- Capable of changing form to evade detection while replicating itself.
Pretexting
- Social engineering tactic where a false narrative is used to obtain sensitive information.
Program File
- Directory designated for non-operating system applications in Windows.
Quarantining
- Antivirus function that isolates infected files to prevent further damage.
Rootkit
- Underlying software tools allowing unauthorized control of a computer without detection.
Scareware
- Malicious software misleading users into purchasing unnecessary programs, often through fear tactics.
Script
- Series of executable commands commonly used in software, capable of running without compilation.
Social Engineering
- Strategies leveraging social principles to manipulate individuals into divulging confidential information.
Spam
- Unwanted digital communications sent to numerous recipients, often unsolicited advertisements.
Spam Filter
- Software designed to identify and block unwanted emails from reaching user inboxes.
Spear Phishing
- Targeted email fraud where attackers impersonate familiar contacts to steal sensitive data.
Spyware
- Covert software used to collect user information or monitor activities without consent.
Stealth Virus
- Virus employing various strategies to avoid detection by antivirus programs.
Surge Protector
- Device protecting electronic devices from voltage spikes by limiting excessive voltages.
Time Bomb
- Program feature that activates or deactivates functions after a predetermined time or date.
Trojan Horse
- Malicious software masquerading as legitimate software to bypass security systems.
Virtual Private Network
- Secure method allowing encrypted access to remote computers via the Internet.
Virus
- Self-replicating code that can corrupt systems or destroy data.
Virus Signature
- Unique identifying pattern of a virus used by antivirus software for detection.
White-Hat Hacker
- Computer security expert who tests and enhances system security, contrasting with malicious hackers.
Whole-House Surge Protector
- A surge protection device located on a residential power panel to safeguard all connected devices.
Worm
- Standalone malware that replicates itself to spread across networks without requiring a host program.
Zombie
- Compromised Internet-connected computer used to carry out malicious activities under remote control.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of essential computer terminology with our Chapter 9 vocabulary flashcards. This quiz covers important terms like adware and antivirus programs, providing definitions to enhance your understanding of computer software.