Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
3.02 Part II
Test Description: Key terms
Instructions: Answer all questions to get your test result.
1) The process of verifying that you are who you say you are
A
Botnet
B
Firewall
C
Authentication
D
Password
2) A string of characters that allows access to a computer, interface, or system.
A
Antivirus Software
B
Password
C
Botnet
D
Authentication
3) A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
A
Authentication
B
Spyware
C
Password
D
Botnet
4) Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
A
Antivirus Software
B
Authentication
C
Password
D
Adware
5) Application used to prevent infection from risks.
A
Identity Fraud
B
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
C
Antivirus Software
D
Hacker
6) A physical device or application designed to deny incoming or outgoing traffic on a network.
A
Firewall
B
Antivirus Software
C
Authentication
D
Botnet
7) An attempt to make a machine or network resource unavailable to its intended users
A
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
B
Antivirus Software
C
Adware
D
Identity Fraud
8) It is a type of malware that collects user information by tracking the habits of users
A
Malware
B
Identity Fraud
C
Spyware
D
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
9) It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
A
Virus
B
Phishing
C
Spyware
D
Malware
10) The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
A
Worm
B
Phishing
C
Malware
D
Spyware
11) It is a person who gains unauthorized access to a computing device or network.
A
Malware
B
Spyware
C
Hacker
D
Trojan Horse
12) Computer program hidden within the shell of another program with an alternative intent such as a virus.
A
Trojan Horse
B
Worm
C
Hacker
D
Virus
13) Software that uses computer networks and security holes to replicate itself.
A
Trojan Horse
B
Phishing
C
Worm
D
Virus
14) A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
A
Trojan Horse
B
Worm
C
Hacker
D
Virus
15) An attempt to use another person's identity to commit a crime.
A
Password
B
Adware
C
Identity Fraud
D
Authentication
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?