Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
A ________ has the same intent as a cracker but does not have the technical skills and knowledge.
|
script kiddie
|
|
A ________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
|
worm
|
|
Email ________ occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender.
|
spoofing
|
|
An ________ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.
|
access control
|
|
A program called a ________ creates software registration numbers and sometimes activation codes.
|
keygen
|
|
A(n) ________ provides specific conditions for use of the software, which a user must accept before using the software.
|
license agreement
|
|
A website that uses encryption techniques to secure its data is known as a(n) ________ .
|
secure site
|
|
The notice that guarantees a user or a website is legitimate is called a ________ .
|
digital certificate
|
|
Keeping backup copies ________ means in a location separate from where you typically store or use your computer or mobile device.
|
off-site
|
|
________ , in which all data is backed up whenever a change is made, is very expensive and requires a great amount of storage.
|
continuous data protection
|
|
Enabling and configuring the ________ feature specifies the computers and mobile devices that can connect to your network.
|
MAC address control
|
|
________ are the moral guidelines that govern the use of computers, mobile devices, and information systems.
|
Computer ethics
|
|
A common infringement of copyright is ________ , where people illegally copy software, movies, and music.
|
piracy
|
|
The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ________ program to help reduce the amount of electricity used by computers and related devices.
|
ENERGY STAR
|
|
Critics contend that the information in a(n) ________ reveals more about an individual than anyone has a right to know.
|
electronic profile
|
|
During ________ browsing, your browser does not keep track of the websites you are visiting.
|
private
|
|
With ________ , an object that can be clicked on a website, such as a button, image, or link, contains a malicious program.
|
clickjacking
|
|
As related to the use of technology, ________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
social engineering
|
|
Many businesses use ________ to restrict employees' access to certain material.
|
content filtering
|