CMIS 108 Chapter 6 – Flashcards

Unlock all answers in this set

Unlock answers
question
____ threats are network security threats that originate from within a network.
answer
Interior
question
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
answer
network
question
When you enter the wrong GPS position for the start point on a trip you are about to take, this is an example of ____.
answer
a data-entry error
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hate
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
answer
US-CERT
question
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
answer
SSL connection
question
______ are examples of malware.
answer
worms, viruses, spyware
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phising
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
The Mac computer employs the ____ system to encrypt its file data.
answer
FileVault
question
A popular encryption method used to protect data that travels over a wireless network is ____.
answer
WPA
question
A common form of authentication is a ____.
answer
password
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
question
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.
answer
RAID
question
Microsoft Windows uses ____ Drive Encryption.
answer
BitLocker
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
question
A ____ allows hackers to gain access to important code or information in a software program.
answer
security hole
question
A company called ____ provides digital certifications for web transactions.
answer
VeriSign
question
What is one realistic way to promote Internet security?
answer
choose strong passwords and change them regularly
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
A ____ may be used to filter data that may be undesirable.
answer
firewall
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
internet server
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
phsising
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
Sites such as eBay are a popular target for ____.
answer
internet fraud
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New