This site is 100% ad supported. Please add an exception to adblock for this site.

K201 FINAL

Terms

undefined, object
copy deck
_____ is a method for confirming users' identities.           
Authentication
A(n)_____ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Firewall
_____ hate hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
White
Trojan-horse virus hides inside other ____, usually as an attachment or a downloadable file. 
Software
The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a Web site at the same time, overloading it and shutting it down.
Ping
Spoofing is the forging of the ____ address on an e-mail so teat the e-mail message appears to come from someone other than the actual sender.
Return
Malicious code includes a variety of threats such as ____, worms, and Trojan horses.
Viruses
Distributed denial-of-service attack (DDoS) attack from multiple ____ that flood a Web site with so many request for service that it slows down or crashes.
Computers
Denial-of-service attach (DoS) ____ a Web site with so many requests for service that it slows down or crashes the site.
Floods
A(n) ____ software written with malicious intent to cause annoyance or damage.
Virus
____ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
Hackers
____ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.
Hactivists
____ is a hacker with criminal intent.
Cracker
____ hate hackers break into other people's computer systems and may just look around or may steal and destroy information.
Black
____ attack computer systems by transmitting a virus hoax, with a real virus attached.
Hoaxes
____ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Cyberterrorist
____ programs are viruses that open a way into the network for future attacks.
Backdoor
A(n)____ is a program or device that can monitor data traveling over a network.
Sniffer
A(n)____ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.
Worm
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ____ environment.
Business
____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Copywright
____ are the principles and standards that guide our behavior toward other people.
Ethics
The ____ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
Electronic
The ____ bill prohibits the use of video rental information on customers for an purpose other than that of marketing goods and services directly to the customer.
Bork
The ___ act restricts what information the federal government can collect.
Privacy
A(n) ____ computer use policy contains general principles to guide computer user behavior.
Nonrepudiation
____ is a contractual stipulation to ensure that e-business participants do no deny their online actions.
Opt-in
____ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
Freedom
The ____ of information act allows and person to examine government records unless it would cause an invasion of privacy.
Acceptable
A(n) ____ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
Internet
A(n) ____ privacy policy details the extent to which e-mail messages may be read by others.
Email
____ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
Spyware
____ is software to generate ads that installs inself on a computer when a person downloads some other program from the Internet.
Adware
Key logger or key trapper software is a ____ that when installed on a computer, records every keystroke and mouse click.
Program

Deck Info

34

jaim38ie

permalink