9: Network and Internet Security Flashcards

1
Q

any illegal act involving a computer

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

gaining access to a computer, mobile device, network, file, or other resource without permission

A

unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

using a computing resource for unapproved activities

A

unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

using a computer to break into another computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

accessing an unsecured Wi-Fi network from your current location without authorization

A

Wi-Fi piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an access control system that uses information only the individual should know to identify that individual

A

possessed knowledge access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a secret combination of characters used to gain access to a computer, computer network, or other resource

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using two different methods to authenticate a user

A

two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an access control system that uses a physical object an individual has in his or her possession to identify that individual

A

possessed object access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual

A

biometric access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a Web page that uses encryption to protect information transmitted via that Web page

A

secure Web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a type of encryption that uses a single key to encrypt and decrypt the file or message

A

private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a type of encryption that uses key pairs to encrypt and decrypt the file or message

A

public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet

A

virtual private network (VPN)

18
Q

an act of malicious destruction to a computer or computer resource

A

computer storage

19
Q

a computer that is controlled by a hacker or other computer criminal

A

bot

20
Q

a group of bots that are controlled by one individual

A

botnet

21
Q

any type of malicious software

A

malware

22
Q

a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system

A

computer virus

23
Q

a malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers

A

computer worm

24
Q

a malicious program that masquerades as something else

A

Trojan horse

25
Q

an act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function

A

denial of service (DoS) attack

26
Q

software, typically a suite of programs, used to protect your computer against a variety of threats

A

security software

27
Q

software used to detect and eliminate computer viruses and other types of malware

A

antivirus software

28
Q

a fraud or scam carried out through the Internet

A

dot con

29
Q

using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual

A

identity theft

30
Q

the use of spoofed communications (typically e-mail messages) to gain credit card numbers and other personal data to be used for fraudulent purposes

A

phishing

31
Q

a personalized phishing scheme targeted at an individual

A

spear phishing

32
Q

the act of accessing someone else’s social media account to make changes to the content or to perform an activity as that individual

A

social media hack

33
Q

the use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities

A

pharming

34
Q

when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller

A

online auction fraud

35
Q

AKA digital ID - a group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures

A

digital certificate

36
Q

a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed

A

digital signature

37
Q

children or teenagers bullying other children or teenagers via the Internet

A

cyberbullying

38
Q

repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method

A

cyberstalking

39
Q

software used by hackers to gather information from a debit/credit card during financial transactions

A

packetsniffing

40
Q

numeric passwords, such as personal identification numbers (PINs)

A

passcodes

41
Q

malware program that activates when it detects a certain condition, such as a particular keystroke being pressed

A

logic bomb

42
Q

a logic bomb that is triggered by a particular time or date

A

time bomb