3.02 Part II Question Preview (ID: 20004)
Key Terms.
TEACHERS: click here for quick copy question ID numbers.
The process of verifying that you are who you say you are
a) Authentication
b) Botnet
c) Password
d) Firewall
A string of characters that allows access to a computer, interface, or system.
a) Authentication
b) Password
c) Botnet
d) Antivirus Software
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
a) Authentication
b) Password
c) Botnet
d) Spyware
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
a) Antivirus Software
b) Password
c) Authentication
d) Adware
Application used to prevent infection from risks.
a) Antivirus Software
b) Identity Fraud
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Hacker
A physical device or application designed to deny incoming or outgoing traffic on a network.
a) Authentication
b) Firewall
c) Botnet
d) Antivirus Software
An attempt to make a machine or network resource unavailable to its intended users
a) Adware
b) Antivirus Software
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Identity Fraud
It is a type of malware that collects user information by tracking the habits of users
a) Identity Fraud
b) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
c) Malware
d) Spyware
It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
a) Spyware
b) Phishing
c) Malware
d) Virus
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
a) Spyware
b) Phishing
c) Malware
d) Worm
It is a person who gains unauthorized access to a computing device or network.
a) Hacker
b) Malware
c) Spyware
d) Trojan Horse
Computer program hidden within the shell of another program with an alternative intent such as a virus.
a) Worm
b) Virus
c) Hacker
d) Trojan Horse
Software that uses computer networks and security holes to replicate itself.
a) Virus
b) Trojan Horse
c) Worm
d) Phishing
A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
a) Worm
b) Trojan Horse
c) Virus
d) Hacker
An attempt to use another person's identity to commit a crime.
a) Adware
b) Identity Fraud
c) Password
d) Authentication
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 20004 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 20004 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register