3.02 Part II Question Preview (ID: 20004)


Key Terms. TEACHERS: click here for quick copy question ID numbers.

The process of verifying that you are who you say you are
a) Authentication
b) Botnet
c) Password
d) Firewall

A string of characters that allows access to a computer, interface, or system.
a) Authentication
b) Password
c) Botnet
d) Antivirus Software

A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
a) Authentication
b) Password
c) Botnet
d) Spyware

Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
a) Antivirus Software
b) Password
c) Authentication
d) Adware

Application used to prevent infection from risks.
a) Antivirus Software
b) Identity Fraud
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Hacker

A physical device or application designed to deny incoming or outgoing traffic on a network.
a) Authentication
b) Firewall
c) Botnet
d) Antivirus Software

An attempt to make a machine or network resource unavailable to its intended users
a) Adware
b) Antivirus Software
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Identity Fraud

It is a type of malware that collects user information by tracking the habits of users
a) Identity Fraud
b) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
c) Malware
d) Spyware

It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
a) Spyware
b) Phishing
c) Malware
d) Virus

The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
a) Spyware
b) Phishing
c) Malware
d) Worm

It is a person who gains unauthorized access to a computing device or network.
a) Hacker
b) Malware
c) Spyware
d) Trojan Horse

Computer program hidden within the shell of another program with an alternative intent such as a virus.
a) Worm
b) Virus
c) Hacker
d) Trojan Horse

Software that uses computer networks and security holes to replicate itself.
a) Virus
b) Trojan Horse
c) Worm
d) Phishing

A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
a) Worm
b) Trojan Horse
c) Virus
d) Hacker

An attempt to use another person's identity to commit a crime.
a) Adware
b) Identity Fraud
c) Password
d) Authentication

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 20004 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register