Chapter 4 Flashcards

(23 cards)

1
Q

War driving Wi-fi piggybacking

A

unauthorized use of WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Processed knowledge access system

A

an identification system that requires the individual requesting to provide info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two-factor authentication

A

Using two different methods to authenticate a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Possessed object access systems

A

use physical objects for identification purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

firewall

A

security system that creates a barrier between a computer/network to protect against unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

Temporarily converting data into a form which is unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Web paged

A

secures data being sent over internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Private Key Encryption

A

Uses one symmetrical key to decrypt and encrypt a file or message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public Key Encryption

A

uses 2 keys to encrypt and encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual private network

A

used when a continuous secure channel over Internet is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer Sabotage

A

acts of malicious destruction to a computer or computer resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

a group of bots controlled by one individual and can work together in a coordinated fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bot

A

A computer that is controlled by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

a type of malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Virus

A

software that is installed that alters the way a computer operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer worms

A

like a virus but does not infect other computer files to replicate itself

17
Q

Trojan Horse

A

malware that masquerades as something else

18
Q

Denial of service attack

A

attempts to flood a network server or web server with too many requests that denies users service

19
Q

dot cons

A

an area of computer crime involves fraud, theft, scams and related activities designed to steal money

20
Q

Phishing

A

a message to trick recipient to revealing sensitive information

21
Q

Pharming

A

using domain names used to obtain personal info

22
Q

Digital certificate

A

authenticates the identity of an individual or organization

23
Q

hacking

A

using one computer to break into another