Solved

Identify the Letter of the Choice That Best Matches the Phrase

Question 157

Matching

Identify the letter of the choice that best matches the phrase or definition.

Premises:
A scam in which a button or link on a Web site contains a malicious program.
A common infringement of copyright.
Usually does not have advanced computer and technical skills.
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
It fails to define a legitimate business need.
Protects a network's resources from intrusion.
A group of compromised computers.
In the encryption process, the encrypted (scrambled) data.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
A notice that guarantees a user or a Web site is legitimate.
Most systems require that a user selects this on his or her own.
Hidden on Web pages in the form of graphical images
In the encryption process, the unencrypted, readable data.
Protects any tangible form of expression.
An authorized person or company that issues and verifies digital certificates.
Responses:
plaintext
Digital Millennium Copyright Act (DCMA)
firewall
copyright
zombie
digital signature
clickjacking
script kiddie
ciphertext
CA
password
CTS
noise
botnet
digital certificate
Fair Credit Reporting Act
piracy
virus hoax
Web bug
CAN-SPAM Act

Correct Answer:

A scam in which a button or link on a Web site contains a malicious program.
A common infringement of copyright.
Usually does not have advanced computer and technical skills.
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
It fails to define a legitimate business need.
Protects a network's resources from intrusion.
A group of compromised computers.
In the encryption process, the encrypted (scrambled) data.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
A notice that guarantees a user or a Web site is legitimate.
Most systems require that a user selects this on his or her own.
Hidden on Web pages in the form of graphical images
In the encryption process, the unencrypted, readable data.
Protects any tangible form of expression.
An authorized person or company that issues and verifies digital certificates.
Related Questions