Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
6 Cards in this Set
- Front
- Back
A ________ is someone who demands payment to stop an attack on an organization's technology infrastructure.
|
cyberextortionist
|
|
________ is a type of malware that is placed on a computer without the user's knowledge that secretly collects information about the user.
|
Spyware
|
|
A(n) ________ encryption algorithm inserts characters between existing characters.
|
expansion
|
|
A(n) ________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.
|
public key
|
|
A(n) ________ backup method is the only real-time back up, providing very fast recovery of data.
|
continuous data protection
|
|
Online shopping websites generally use a ________ to keep track of items in a user's shopping cart.
|
session cookie
|