• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
A ________ has the same intent as a cracker but does not have the technical skills and knowledge.
script kiddie
A ________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
worm
Email ________ occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender.
spoofing
An ________ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.
access control
A program called a ________ creates software registration numbers and sometimes activation codes.
keygen
A(n) ________ provides specific conditions for use of the software, which a user must accept before using the software.
license agreement
A website that uses encryption techniques to secure its data is known as a(n) ________ .
secure site
The notice that guarantees a user or a website is legitimate is called a ________ .
digital certificate
Keeping backup copies ________ means in a location separate from where you typically store or use your computer or mobile device.
off-site
________ , in which all data is backed up whenever a change is made, is very expensive and requires a great amount of storage.
continuous data protection
Enabling and configuring the ________ feature specifies the computers and mobile devices that can connect to your network.
MAC address control
________ are the moral guidelines that govern the use of computers, mobile devices, and information systems.
Computer ethics
A common infringement of copyright is ________ , where people illegally copy software, movies, and music.
piracy
The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ________ program to help reduce the amount of electricity used by computers and related devices.
ENERGY STAR
Critics contend that the information in a(n) ________ reveals more about an individual than anyone has a right to know.
electronic profile
During ________ browsing, your browser does not keep track of the websites you are visiting.
private
With ________ , an object that can be clicked on a website, such as a button, image, or link, contains a malicious program.
clickjacking
As related to the use of technology, ________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
social engineering
Many businesses use ________ to restrict employees' access to certain material.
content filtering