• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
______ determines what an individual can do in the system after he or she is authenticated.
authorization
Antivirus (AV) software detects a known virus by looking for distinguishing characteristics called __________.
virus signatures
A(n) _________ utility fills every sector on a drive with zeros.
zero fill utility
A(n) _______ tracks all your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC.
key logger
A device, such as a type of smart card, that
can fit conveniently on a key chain

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
key fob
A type of password that can contain a
phrase where spaces are allowed

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware.
passphrase
Malicious software installed on your PC that
disconnects your phone line from your ISP and
dials up an expensive pay-per-minute phone number
without your knowledge.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
dialer
A strong password has ___ or more characters.
a. six c. eight
b. seven d. nine
eight
An alternative e-mail client to microsoft Outlook and Outlook Express is __________

a. Eudora c. Opera
b. Firefox d. Internet Explorer
Eudora
______ is a type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself

a. Scam e-mail c. Virus hoax
b. Phishing d. Guerilla marketing
Phishing
Digital certificates are transported over the Internet and verified using ______ standards.

a. EFS c. AV
b. PKI d. CHAP
PKI
_____ displays pop-up ads based on your browsing habits.

a. Adware c. Virus
b. Spyware d. Spam
Adware
_____ is junk e-mail that you don't want, that you didn't ask for, and that gets in your way.

a. Adware c. A virus
b. Spyware d. Spam
Spam
A(n) _______ is a program that copies itself throughout a network or the Internet without a host program.

a. adware c. virus
b. spyware d. worm
worm
A____does not need a host program to work; rather, it substitutes itself for a legitimate program.

a. logic bomb c. virus
b. Trojan horse d. browser hijacker
Trojan horse
A_____is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

a. boot sector virus c. macro
b. file virus d. multipartite virus
macro
Some viruses can continually transform themselves so they will not be detected by AV software that is looking for a particular characteristic. A virus that uses this technique is called a(n) ______ virus.

a. encrypting c. script
b. stealth d. multipartite
encrypting
A small program that can be downloaded by a Web site to your computer

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
ActiveX control
A segment of data sent over a network connection.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
packet
Any unwanted program that means you harm and is transmitted to your computer without your knowledge.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
malware
A program that replicates by attaching itself to other programs.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
virus
Produces unwanted pop-up ads.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
adware
Software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm.

a. virus f. packet
b. key fob g. spyware
c. adware h. ActiveX control
d. passphrase i. dialer
e. malware
spyware