Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Today, combating cybercrime is one of the ________ 's top priorities.
|
FBI
|
|
The term, ________ , describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
|
cyberwarfare
|
|
The ________ is the destructive event or prank malware is intended to deliver.
|
payload
|
|
Which of the following is NOT a symptom of a computer or mobile device functioning as a zombie?
|
Low audio quality
|
|
A more devastating type of DoS attack is the ________ DoS attack in which a zombie army is used to attack computers or computer networks.
|
distributed
|
|
________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
spoofing
|
|
Some viruses are hidden in ________ , which are instructions saved in software such as a word processing program or spreadsheet program.
|
macros
|
|
A(n) ________ server is a server outside the organization's network that controls which communications pass in and out of the organization's network.
|
proxy
|
|
An organization's ________ should specify the acceptable use of technology by employees for personal reasons.
|
AUP (acceptable use policy)
|
|
A ________ displays an image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.
|
CAPTHA
|
|
Any item that you must carry to gain access to a computer or computer facility is called a ________ .
|
possessed object
|
|
________ occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.
|
software theft
|
|
Software ________ is the unauthorized and illegal duplication of copyrighted software.
|
piracy
|
|
The right to use software is called a(n) ________ .
|
license agreement
|
|
The ________ was formed to promote a better understanding of software piracy problems.
|
Business Software Alliance (BSA)
|
|
A(n) ________ license is a legal agreement that permits users to install the software on multiple computers.
|
site
|
|
Encryption programs typically use more than one encryption algorithm, along with a(n) ________ .
|
encryption key
|
|
With ________ encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data.
|
private key (symmetric key encryption)
|
|
A(n) ________ encryption algorithm removes characters and stores them elsewhere.
|
compaction
|
|
A(n) ________ is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
|
digital signature
|
|
A wireless network should be configured so that it does not broadcast a network name, known as a(n) ________ .
|
SSID
|
|
Frequently discussed areas of ________ are unauthorized use of computers, mobile devices, and networks; software theft; information accuracy; intellectual property rights; codes of conduct; green computing; and information privacy.
|
computer ethics
|
|
________ refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
|
Intellectual property (IP)
|
|
A ________ protects any tangible form of expression.
|
copyright
|
|
A(n) ________ is a written guideline that helps determine whether a specificaction is ethical/unethical or allowed/not allowed.
|
code of conduct
|
|
The right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them is referred to as ________ .
|
information privacy
|
|
To safeguard personal information, turn off file and printer sharing on your Internet connection and ________ .
|
request, in writing, to be removed from mailing lists
|
|
The ________ requires that schools and libraries use content filtering software in order to receive certain federal funds.
|
Children's Internet Protection Act (CIPA)
|