Deck 26: Information Security

Full screen (f)
exit full mode
Question
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of these
Use Space or
up arrow
down arrow
to flip the card.
Question
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
Question
What is the recommended way to implement information security lines of defense?

A) People first, technology second
B) Technology first, people second
C) None of these
D) All of these
Question
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
Question
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) All of these
Question
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of these
Question
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
Question
Which of the following is not considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) None of these
Question
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) None of these
Question
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Question
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of these
Question
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Question
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) None of these
Question
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of these
Question
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these
Question
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
Question
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
Question
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
Question
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
Question
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
Question
Tokens are small electronic devices that change user passwords automatically.
Question
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
Question
Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
Question
Who are hackers with criminal intent?

A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists
Question
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Question
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
Question
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists
Question
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivist
D) Script kiddies
Question
A(n)information security ____________ details how an organization will implement the information security policies.
Question
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Question
Information security ______________ identify the rules required to maintain information security.
Question
What includes a variety of threats such as viruses,worms,and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Question
What attacks computer systems by transmitting a virus hoax,with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Question
If there is a security breach on your organizational information systems,which information security area is best suited to handle the breach?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
Question
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Question
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Question
What is the most common type of defense within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
Question
What floods a website with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these
Question
What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these
Question
Information security policies detail how an organization will implement the information security plan.
Question
____________ is the identification of a user based on a physical characteristic.
Question
Tokens are small electronic devices that change user passwords __________.
Question
Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.
Question
___________ attack computer systems by transmitting a virus hoax,with a real virus attached.
Question
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Question
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
Question
A(n)_______ is a program or device that can monitor data traveling over a network.
Question
_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Question
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
Question
___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Question
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
Question
Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
Question
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
Question
Social engineering is using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.
Question
The most common type of defense within detection and response technologies is _________ software.
Question
Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.
Question
Develop the information security policies is the ________________ step for creating an information security plan.
Question
___________ is a method for confirming users' identities.
Question
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Question
Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Question
Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
Question
A(n)_________ is software written with malicious intent to cause annoyance or damage.
Question
_______________ is a hacker with criminal intent.
Question
List and describe the three primary security areas.
Question
The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.
Question
A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.
Question
Describe the relationships and differences between hackers and viruses.
Question
Summarize the five steps to creating an information security plan.
Question
Describe authentication and the most secure type of authentication.
Question
Describe the relationship between information security policies and an information security plan.
Question
Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.
Question
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
Question
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Question
_________ programs are viruses that open a way into the network for future attacks.
Question
Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.
Question
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 26: Information Security
1
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of these
C
Explanation: Detection and resistance is not one of the three primary information security areas, it should be detection and response.
2
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
B
Explanation: This is the definition of information security policies.
3
What is the recommended way to implement information security lines of defense?

A) People first, technology second
B) Technology first, people second
C) None of these
D) All of these
A
Explanation: An organization should implement information security lines of defense through people first and technology second.
4
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) All of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
Tokens are small electronic devices that change user passwords automatically.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
Who are hackers with criminal intent?

A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hackers
B) Black-hat hackers
C) Crackers
D) Cyberterrorists
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivist
D) Script kiddies
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)information security ____________ details how an organization will implement the information security policies.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
Information security ______________ identify the rules required to maintain information security.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
What includes a variety of threats such as viruses,worms,and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
What attacks computer systems by transmitting a virus hoax,with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
If there is a security breach on your organizational information systems,which information security area is best suited to handle the breach?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
What is the most common type of defense within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
What floods a website with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of these
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
Information security policies detail how an organization will implement the information security plan.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
____________ is the identification of a user based on a physical characteristic.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
Tokens are small electronic devices that change user passwords __________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
___________ attack computer systems by transmitting a virus hoax,with a real virus attached.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
A(n)_______ is a program or device that can monitor data traveling over a network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
Social engineering is using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
The most common type of defense within detection and response technologies is _________ software.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
Develop the information security policies is the ________________ step for creating an information security plan.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
___________ is a method for confirming users' identities.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
A(n)_________ is software written with malicious intent to cause annoyance or damage.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
_______________ is a hacker with criminal intent.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
List and describe the three primary security areas.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
Describe the relationships and differences between hackers and viruses.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
Summarize the five steps to creating an information security plan.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
Describe authentication and the most secure type of authentication.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
Describe the relationship between information security policies and an information security plan.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
_________ programs are viruses that open a way into the network for future attacks.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 76 flashcards in this deck.