Chapter 5 example #56139

7 March 2024
5 (86 reviews)
17 test answers

Unlock all answers in this set

Unlock answers (13)
question
Back Door
answer
A program that allows an unauthorized user to bypass the security controls on a computer and access programs, files, and the network. Computers with this that are controlled by others are called zombies.
question
Bot
answer
A program that performs repetitive tasks on a network.
question
Certificate Authority
answer
A business that provides and verifies digital certificates online.
question
Cracker
answer
Someone who accesses a computer or computer network illegally with the intent of stealing information, destroying data, or performing a malicious action.
question
Cyberterrorist
answer
Someone who uses the Internet or network to damage data or computers for political or religious reasons.
question
Decryption
answer
The process of taking a chunk of encrypted data and converting it back to a form that can be read and used.
question
Digital Certificate
answer
Makes uses of asymmetric encryption to provide a means of guaranteeing that a user or website is legitimate. If the certificate comes from a source you don't already know, its best to verify through a certificate authority.
question
Encryption
answer
The process by which a chunk of data is mathematically modified to make it unreadable to anyone that does not possess the proper key and/or technique for accessing it.
question
Firewall
answer
A computer program that protects a user by blocking unauthorized transmissions and informing the user about any attempted intrusions. Programs communicate through ports and this does not allow access to ports that are not explicitly allowed by the user.
question
Hacker
answer
A computer enthusiast who accesses a computer or network illegally.
question
Malware
answer
Malicious software that consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices. Examples include viruses, rootkits, worms, and Trojan horses.
question
Phising
answer
A scam in which the perpetrator sends an official email or communication that attempts to obtain a user's passwords or personal and financial information.
question
Rootkit
answer
Hides in a computer or mobile device and allows a remote user to take full control of the computer or device.
question
Script Kiddie
answer
Someone who lacks the technological skill to break into a computer or computer network, but who does so through the use of premade programs and hacker tools.
question
Spoofing
answer
The act of making an Internet transmission appear as if it was legitimately sent by someone else.
question
Trojan Horse
answer
Malware that disguises itself as a desirable program such as a game, but when it is installed it may perform malicious tasks behind the scenes such as implanting a rootkit.
question
Worm
answer
Malware that works by copying itself repeatedly in memory or storage.While it does not directly damage files, the copies may eventually consume all available resources and cause the computer, device, or network to cease functioning