Cyber Security Terminology Quiz
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following symbols represents a trademark?

  • TM, SM and TM
  • TM, MS
  • TM, SM (correct)
  • TM, MT
  • Which process involves hiding information within other information?

  • Data compression
  • Steganography (correct)
  • Data encryption
  • Data masking
  • What is the purpose of watermarking in digital files?

  • To prevent unauthorized distribution
  • To identify copyright information (correct)
  • To enhance the visual appearance
  • To improve file compression
  • Which starting address indicates a secure site using SSL protocol?

    <p>https://</p> Signup and view all the answers

    Which aspect of M-Commerce security ensures information is not tampered with during transmission?

    <p>Integrity</p> Signup and view all the answers

    Who is responsible for issuing a credit card and guaranteeing payments to the merchant?

    <p>Issuing bank</p> Signup and view all the answers

    Which type of card contains a microchip embedded on its surface?

    <p>Smart card</p> Signup and view all the answers

    What is the primary purpose of a firewall in network security?

    <p>To block unauthorized access</p> Signup and view all the answers

    What is known as the electronic defacing of an existing website page?

    <p>Cyber vandalism</p> Signup and view all the answers

    Which type of attack involves pretending to be someone else or misrepresenting a website as authentic?

    <p>Spoofing</p> Signup and view all the answers

    What is the purpose of antivirus software?

    <p>To detect and remove malicious codes</p> Signup and view all the answers

    What does the term 'encryption' refer to?

    <p>The conversion of normal text into unreadable text</p> Signup and view all the answers

    Which protocol is primarily used for securing web transactions on the Internet?

    <p>SSL</p> Signup and view all the answers

    Who developed the SSL protocol?

    <p>Netscape</p> Signup and view all the answers

    Which address indicates that a website is secured by an SSL protocol?

    <p>https://</p> Signup and view all the answers

    What legal tool helps protect original work from being used without permission?

    <p>Copyright</p> Signup and view all the answers

    What refers to buying and selling by mobile phone?

    <p>M-Commerce</p> Signup and view all the answers

    Which security aspect of E-commerce/M-commerce ensures that information is not altered during transmission?

    <p>Integrity</p> Signup and view all the answers

    What is the term for transforming readable text into an unreadable format?

    <p>Encryption</p> Signup and view all the answers

    Which entity is responsible for issuing a credit card and guaranteeing payment to a merchant?

    <p>Issuing bank</p> Signup and view all the answers

    Which card type can store significantly more information than a standard card?

    <p>Smart card</p> Signup and view all the answers

    Which of the following is not a recognized trademark symbol?

    <p>PM</p> Signup and view all the answers

    What is the process of hiding information within other information known as?

    <p>Steganography</p> Signup and view all the answers

    Which method involves transferring money from one bank account to another electronically?

    <p>ACH transaction</p> Signup and view all the answers

    Study Notes

    Cyber Security Terms

    • Malicious Code: Software designed to disrupt, damage, or gain unauthorized access to computer systems.
    • Denial of Service (DoS): A cyber attack aimed at making a service unavailable by overwhelming it with traffic.
    • Spoofing: Illegally changing information to appear as if it is coming from a trusted source.

    Cyber Vandalism

    • Defined as electronic defacing of an existing webpage, altering its appearance for malicious intent.

    Antivirus Software

    • A program that detects and removes malicious software like viruses, worms, and trojan horses from infected systems.

    Encryption and Decryption

    • Encryption: The process of converting plain text into an unreadable format (cipher text) using an algorithm.
    • Decryption: The reverse process of converting cipher text back into readable plain text.

    SSL Protocol

    • SSL (Secure Sockets Layer): A protocol used to secure internet transactions, ensuring data integrity and safety.
    • Developed by Netscape.

    Web Address Indicators

    • Websites secured by SSL begin with https://, indicating a secure connection.

    Intellectual Property

    • Copyright: Protects original works from unauthorized use.
    • Trademark: A specific logo, mark, design, or phrase that distinguishes a product or service from others.

    Trademark Symbols

    • Common symbols for trademarks include TM and SM. PM is not recognized as a trademark symbol.

    Steganography

    • The art of hiding information within other forms of information, like images or audio files.

    Digital Watermarking

    • A digital code embedded in media files that identifies copyright information.

    Credit Card Processing

    • Issuing bank is responsible for guaranteeing payment to merchants during credit card transactions.

    Smart Cards

    • Payment cards that contain embedded microchips, storing significantly more data than regular cards.

    M-Commerce

    • Refers to buying and selling conducted through mobile phones. Secure sites have addresses that start with https://.

    Security Aspects of E-commerce and M-Commerce

    • Integrity: Ensures information is not altered or tampered with during transmission.
    • Non-repudiation: Assures that a transaction cannot be denied by the parties involved.

    Common Payment Transfers

    • Electronic transfer of funds between bank accounts is a key feature of online banking.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    computer ch 5.docx

    Description

    Test your knowledge of essential cyber security terms and concepts. This quiz covers topics like malicious code, DoS attacks, antivirus software, and encryption. Perfect for anyone wanting to enhance their understanding of cyber security.

    Use Quizgecko on...
    Browser
    Browser