Podcast
Questions and Answers
A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer security risk
Affects a computer negatively by altering the way the computer works
Affects a computer negatively by altering the way the computer works
virus
Program that hides in a computer and allows someone from a remote location to take full control
Program that hides in a computer and allows someone from a remote location to take full control
Rootkit
A___________ is an online or Internet-based illegal act
A___________ is an online or Internet-based illegal act
Signup and view all the answers
a person who breaks into computer system
a person who breaks into computer system
Signup and view all the answers
a person often steal, delete, corrupt, or compromise data
a person often steal, delete, corrupt, or compromise data
Signup and view all the answers
A ________ is a group of compromised computers connected to a network
A ________ is a group of compromised computers connected to a network
Signup and view all the answers
A compromised computer is known
A compromised computer is known
Signup and view all the answers
A _______________________ disrupts computer access to Internet services
A _______________________ disrupts computer access to Internet services
Signup and view all the answers
A ____________ is a program or set of instructions in a program that allow users to bypass security controls
A ____________ is a program or set of instructions in a program that allow users to bypass security controls
Signup and view all the answers
___________ is a technique intruders use to make their network or Internet transmission appear legitimate
___________ is a technique intruders use to make their network or Internet transmission appear legitimate
Signup and view all the answers
A ________ is hardware and/or software that protects a network’s resources from intrusion
A ________ is hardware and/or software that protects a network’s resources from intrusion
Signup and view all the answers
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Signup and view all the answers
A malicious program that hides within or looks like a legitimate program
A malicious program that hides within or looks like a legitimate program
Signup and view all the answers
Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Signup and view all the answers
Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches
Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches
Signup and view all the answers
_____________ is the use of a computer or network without permission
_____________ is the use of a computer or network without permission
Signup and view all the answers
is the use of a computer or its data for unapproved or possibly illegal activities
is the use of a computer or its data for unapproved or possibly illegal activities
Signup and view all the answers
Two-phase processes called
Two-phase processes called
Signup and view all the answers
A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Signup and view all the answers
_____________ is the discovery, collection, and analysis of evidence found on computers and networks
_____________ is the discovery, collection, and analysis of evidence found on computers and networks
Signup and view all the answers
is the act of stealing computer equipment
is the act of stealing computer equipment
Signup and view all the answers
is the act of defacing or destroying computer equipment
is the act of defacing or destroying computer equipment
Signup and view all the answers
Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________
Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________
Signup and view all the answers
___________occurs when someone steals personal or confidential information
___________occurs when someone steals personal or confidential information
Signup and view all the answers
is a process of converting readable data into unreadable characters to prevent unauthorized access
is a process of converting readable data into unreadable characters to prevent unauthorized access
Signup and view all the answers
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Signup and view all the answers
is a notice that guarantees a user or a Web site is legitimate
is a notice that guarantees a user or a Web site is legitimate
Signup and view all the answers
A_____________is the prolonged malfunction of a computer
A_____________is the prolonged malfunction of a computer
Signup and view all the answers
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Signup and view all the answers
Two categories of backups:
Two categories of backups:
Signup and view all the answers
allows individuals to detect wireless networks while driving a vehicle through the area
allows individuals to detect wireless networks while driving a vehicle through the area
Signup and view all the answers
The widespread use of computers has led to health concerns such as what?
The widespread use of computers has led to health concerns such as what?
Signup and view all the answers
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Signup and view all the answers
occurs when the computer consumes someone’s entire social life
occurs when the computer consumes someone’s entire social life
Signup and view all the answers
the moral guidelines that govern the use of computers and information systems
the moral guidelines that govern the use of computers and information systems
Signup and view all the answers
are the rights to which creators are entitled for their work
are the rights to which creators are entitled for their work
Signup and view all the answers
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
Signup and view all the answers
involves reducing the electricity and environmental waste while using a computer
involves reducing the electricity and environmental waste while using a computer
Signup and view all the answers
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Signup and view all the answers
is a small text file that a Web server stores on your computer
is a small text file that a Web server stores on your computer
Signup and view all the answers
is an unsolicited e-mail message or newsgroup posting
is an unsolicited e-mail message or newsgroup posting
Signup and view all the answers
blocks e-mail messages from designated sources
blocks e-mail messages from designated sources
Signup and view all the answers
attempt to remove spam before it reaches your inbox
attempt to remove spam before it reaches your inbox
Signup and view all the answers
_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
Signup and view all the answers
is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
Signup and view all the answers
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Signup and view all the answers
________________ involves the use of computers to observe, record, and review an employee’s use of a computer
________________ involves the use of computers to observe, record, and review an employee’s use of a computer
Signup and view all the answers
______________ is the process of restricting access to certain material on the Web
______________ is the process of restricting access to certain material on the Web
Signup and view all the answers
______________________ restricts access to specified Web sites
______________________ restricts access to specified Web sites
Signup and view all the answers