• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

Network

Which of the following categories are the rights to which creators are entitled for their work?

Intellectual property

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

Digital

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

Phishing

Which of the following provides the mobile user with a secure connection to the company network server?

VPN

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

Decryption

With a three-generation backup policy, the grandparent is which of the following?

Oldest copy of the file

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

site

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

Cyberextortionist

Internet advertising firms often use which of the following to collect information about users web browsing habits?

Spyware

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

Information privacy

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Digital security risk

Which of the following is someone who uses the internet or network to destroy or damage computers for political reasons?

Cyberterrorist

Which encryption algorithm inserts characters between existing characters?

expansion

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

They restore the files

Which of the following copies all of the files in a computer?

Full backup

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

IP

With which of the following do users choose which folders and files to include in a backup?

Selective backup

Which of the following is an authorized person or company that issues and verifies digital certificates?

Certificate authority?

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

Malware

What is the term for a website that uses encryption techniques to protect its data?

Secure site

Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network?

spoofing

Which of the following gives authors and artists to duplicate, publish and sell their materials?

copyright

Websites use which of the following to keep track of items in a user's shopping cart?

Session cookie

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications to electronic communications such as voice mail?

Electronic Communications Privacy Act (ECPA)