MXW - Computer - Chap 10

26 terms by Swimming-Bear 

Create a new folder

Advertisement Upgrade to remove ads

It's best to use three-factor authentication.

FALSE

The International Organization for Standardization has developed two documents (____), which describe, in detail, the recommended standards to secure computer resources.

ISO 17799 and ISO 27002

As a defensive and offensive measure to protect against malicious software, install and run ____ software and keep it current.

Antivirus

When you are responsible for the security of a computer or small network, make it a habit to check every computer for which you are responsible every day.

FALSE

A ____ virus is a combination of a boot sector virus and a file virus and can hide in either.

multipartite

Don't use the same password on more than one system (computer, network, or application).

TRUE

A(n) ____ account has complete access to the system and can make changes that affect the security of the system and other users.

Administrator

A ____ virus can hide in either of two boot areas of a hard drive.

Boot sector

Individuals are always free to decide what security measures they want to use.

FALSE

A(n) ____ account has read-write access only on its own folders, read-only access to most system folders, and no access to other users' data

Limited

____ is any annoying and unwanted program that might or might not mean you harm.

Grayware

A ____ is assigned by a Certification Authority, and is used to prove you are who you say you are.

digital certificate

A(n)____ password means it is not easy to guess by both humans and computer programs designed to hack passwords.

strong

A ____ is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.

macro

Folders and files stored on a workstation or server that contain user data need to be classified as to the ____ assigned to the data.

ermissions

Internet Explorer includes the pop-up blocker, the ability to manage add-ons, the ability to block scripts and disable scripts embedded in Web pages, and the ability to set the general security level.

TRUE

When implementing a security plan, the four steps are sometimes called the ____.

Plan-Do-Study-Act

Generally speaking, the weakest link in setting up security in a computer environment is ____.

People

For the health care industry, the ____ includes regulations to secure patient data that apply to all health care companies and professionals.

HIPAA

A network ____ map is one of the most powerful and versatile methods of communicating over a network.

drive

A ____ is made of several words with spaces allowed.

passphrase

Because of the problem of losing encrypted data and Internet passwords when a user password is reset, each new user should create a password ____ disk for use in the event the user forgets the password.

reset

A Trojan sometimes installs a ____ in the system, which is a hidden way to allow malware to reach the system in secret even after the Trojan has been removed.

backdoor

Most encryption software products use a method called ____.

Public Key Encryption

Most hard drive manufactures offer a ____ is used to wipe clean all data on the drive.

Zero-fill utility

In the computer arena, ____ is the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.

Social Enginerring

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set