Upgrade to remove ads
chapter 11 study guide
Terms in this set (34)
What is the area called on the hard disk where the computer stores infected files?
...INSTALL PERSONAL FIREWALL/ SCAN ALL DOWNLOADS PROGRAMSFOR VIRUSES/ STAY INFORMED ABOUT NEW VIRUSES
List Three tips for preventing viruses and other malware
Hardware or software that is used to help protect a network's resources against intrusion by users on another network is known as what
...A VULNERABLE COMPUTER THAT SETS UP TO ENTICE AN INTRUDER TO BRAKE INTO IT
What is a Honeypot
...EVIDENCE FOUND ON COMPUTERS
What is digital forensics
...STEALS SOFTWARE MEDIA / ERASED PROGRAMS ON PURPOS/ ILLEAGEL COPIES
Give 3 examples of software theft
...DUPLICATE OF COPY RIGHT SOFTWARE or delete something off someone computer
What is software piracy
...SOMEONE STEALS YOUR INFORMATION
What is information theft
What is the process of converting readable data into unreadable characters to prevent unauthorized access?
One of the more common causes of _____ is an electrical power variation
A momentary over voltage, called a _____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
A _____ is the unit of energy a surge protection device can absorb before it can be damaged.
A(n) _____ copies all of the files in a computer
With a(n) _____, users choose which folders and files to include in a backup.
Some perpetrators use a technique called _____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
A _____ is a small text file that a Web server stores on a user's computer.
is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
... military intelligence law enforcement
insurance agencies all of the above
Computer forensics is used by
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
...neglects family and friends
Symptoms of a user with computer addiction include all of the following except
...Computer security risk
What is an event or action that could cause a loss or damage to computer hardware, software, data, information, or processing ability?
Today, what is one of the FBI's top three priorities
Hacker, Cracker, Script Kiddie, Cyberextortionist, Cyber Terrorist, Corporate Spies, Unethical Employees
List the seven categories of cyber crime.
What type of perpetrator has the intent of destroying data, stealing information, or other malicious activities?
Which category of cyber crime would most likely try to alter or corrupt an air traffic control system?
Online Security System
What could you use to determine if your computer is vulnerable to attacks?
What is a damaging program that copies itself over and over, using up resources and possibly shutting down a computer?
Malware is short for what term?
. Plays random music, existing files disappear, Shut downs unexpectedly.
List 3 symptoms a computer may show when infected.
Opens an infected file, opens an infected program, connects computer to a program, when an occasion come up
List the 4 ways a virus, worm or Trojan horse deliver their payload.
Currently how many know viruses, worms, and Trojan horses exist? How many new ones are found each day?
Is there a way to guarantee a computer is safe against infection?
rent or lease the software
When users purchase software, a single-user license agreement permits users to do any of the following except
make one copy of the software
When users purchase software, a single-user license agreement does not permit users to do any of the following except
THIS SET IS OFTEN IN FOLDERS WITH...
Computers Test 2
computers ch. 3
Chapter 11 Discovering Computers
YOU MIGHT ALSO LIKE...
EO2 - Unit 5 (Medium)
Flow Chart Symbols, CSP 9 Week Review, C…
OTHER SETS BY THIS CREATOR
bradys study gouide
OTHER QUIZLET SETS
MBLDD: Cytology I - III
bible ch 10 and 11
MIS Chapter 5