Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
chapter 5
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (25)
what is an authorized person or company that issues and verifies digital certificates?
certificate authority
what provides the mobile user with a secure connection to the company network server?
VPN
what do users use to choose which folders and files to include in a backup
selective back up
what are the rights to which creators are entitled for their work
intellectual property
what encryption algorithm inserts characters between existing characters
expansion
what refers to a unique and original works such as ideas nventions, writings, art, processes, company and product names, and logos?
IP
With a three-generation backup policy, the grandparent is which of the following?
the oldest copy of a file
what refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
what laws provide the same protection that covers mail and telephone communications to electronic communications such as voice mail?
electronic communications privacy act (ECPA)
what is a technique intruders use to make their network of internet transmissions appear legitimate to a victim computer or network?
spoofing
what is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
cyberextortionist
What is the term for a website that uses encryption techniques to protect its data?
secure site
what is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
digital security risk
what kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
network license
what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
copyright
what kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
site license
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
decryption
what is someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
Websites use which of the following to keep track of items in a user's shopping cart?
session cookie
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
malware
what s a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
phishing
what copies all of the files in a computer?
full back up
what kind of certificate is a notice that guarantees a user or website is legitimate?
digital
Internet advertising firms often use what to collect information about users web browsing habits?
spyware
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
they restore the files
THIS SET IS OFTEN IN FOLDERS WITH...
FSU CGS 2060 Chapter 10
49 terms
chapter 1
25 terms
chapter 2
25 terms
chapter 3
25 terms
YOU MIGHT ALSO LIKE...
CGS 2060 Chapter 5
43 terms
Personal Computing - Chapter 5
15 terms
CS102 ch. 5
63 terms
Chapter 5
20 terms
OTHER SETS BY THIS CREATOR
US Intelligence Policy Final FSU
89 terms
Final Exam
32 terms
Final Exam Duggleby
64 terms
U.S. INTELLIGENCE FINAL
87 terms