• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
Today, combating cybercrime is one of the ________ 's top priorities.
FBI
The term, ________ , describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
cyberwarfare
The ________ is the destructive event or prank malware is intended to deliver.
payload
Which of the following is NOT a symptom of a computer or mobile device functioning as a zombie?
Low audio quality
A more devastating type of DoS attack is the ________ DoS attack in which a zombie army is used to attack computers or computer networks.
distributed
________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
spoofing
Some viruses are hidden in ________ , which are instructions saved in software such as a word processing program or spreadsheet program.
macros
A(n) ________ server is a server outside the organization's network that controls which communications pass in and out of the organization's network.
proxy
An organization's ________ should specify the acceptable use of technology by employees for personal reasons.
AUP (acceptable use policy)
A ________ displays an image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs.
CAPTHA
Any item that you must carry to gain access to a computer or computer facility is called a ________ .
possessed object
________ occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.
software theft
Software ________ is the unauthorized and illegal duplication of copyrighted software.
piracy
The right to use software is called a(n) ________ .
license agreement
The ________ was formed to promote a better understanding of software piracy problems.
Business Software Alliance (BSA)
A(n) ________ license is a legal agreement that permits users to install the software on multiple computers.
site
Encryption programs typically use more than one encryption algorithm, along with a(n) ________ .
encryption key
With ________ encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data.
private key (symmetric key encryption)
A(n) ________ encryption algorithm removes characters and stores them elsewhere.
compaction
A(n) ________ is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
digital signature
A wireless network should be configured so that it does not broadcast a network name, known as a(n) ________ .
SSID
Frequently discussed areas of ________ are unauthorized use of computers, mobile devices, and networks; software theft; information accuracy; intellectual property rights; codes of conduct; green computing; and information privacy.
computer ethics
________ refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
Intellectual property (IP)
A ________ protects any tangible form of expression.
copyright
A(n) ________ is a written guideline that helps determine whether a specificaction is ethical/unethical or allowed/not allowed.
code of conduct
The right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them is referred to as ________ .
information privacy
To safeguard personal information, turn off file and printer sharing on your Internet connection and ________ .
request, in writing, to be removed from mailing lists
The ________ requires that schools and libraries use content filtering software in order to receive certain federal funds.
Children's Internet Protection Act (CIPA)