Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
______ determines what an individual can do in the system after he or she is authenticated.
|
authorization
|
|
Antivirus (AV) software detects a known virus by looking for distinguishing characteristics called __________.
|
virus signatures
|
|
A(n) _________ utility fills every sector on a drive with zeros.
|
zero fill utility
|
|
A(n) _______ tracks all your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC.
|
key logger
|
|
A device, such as a type of smart card, that
can fit conveniently on a key chain a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
key fob
|
|
A type of password that can contain a
phrase where spaces are allowed a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware. |
passphrase
|
|
Malicious software installed on your PC that
disconnects your phone line from your ISP and dials up an expensive pay-per-minute phone number without your knowledge. a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
dialer
|
|
A strong password has ___ or more characters.
a. six c. eight b. seven d. nine |
eight
|
|
An alternative e-mail client to microsoft Outlook and Outlook Express is __________
a. Eudora c. Opera b. Firefox d. Internet Explorer |
Eudora
|
|
______ is a type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself
a. Scam e-mail c. Virus hoax b. Phishing d. Guerilla marketing |
Phishing
|
|
Digital certificates are transported over the Internet and verified using ______ standards.
a. EFS c. AV b. PKI d. CHAP |
PKI
|
|
_____ displays pop-up ads based on your browsing habits.
a. Adware c. Virus b. Spyware d. Spam |
Adware
|
|
_____ is junk e-mail that you don't want, that you didn't ask for, and that gets in your way.
a. Adware c. A virus b. Spyware d. Spam |
Spam
|
|
A(n) _______ is a program that copies itself throughout a network or the Internet without a host program.
a. adware c. virus b. spyware d. worm |
worm
|
|
A____does not need a host program to work; rather, it substitutes itself for a legitimate program.
a. logic bomb c. virus b. Trojan horse d. browser hijacker |
Trojan horse
|
|
A_____is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
a. boot sector virus c. macro b. file virus d. multipartite virus |
macro
|
|
Some viruses can continually transform themselves so they will not be detected by AV software that is looking for a particular characteristic. A virus that uses this technique is called a(n) ______ virus.
a. encrypting c. script b. stealth d. multipartite |
encrypting
|
|
A small program that can be downloaded by a Web site to your computer
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
ActiveX control
|
|
A segment of data sent over a network connection.
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
packet
|
|
Any unwanted program that means you harm and is transmitted to your computer without your knowledge.
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
malware
|
|
A program that replicates by attaching itself to other programs.
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
virus
|
|
Produces unwanted pop-up ads.
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
adware
|
|
Software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm.
a. virus f. packet b. key fob g. spyware c. adware h. ActiveX control d. passphrase i. dialer e. malware |
spyware
|