Upgrade to remove ads
Terms in this set (25)
what is an authorized person or company that issues and verifies digital certificates?
what provides the mobile user with a secure connection to the company network server?
what do users use to choose which folders and files to include in a backup
selective back up
what are the rights to which creators are entitled for their work
what encryption algorithm inserts characters between existing characters
what refers to a unique and original works such as ideas nventions, writings, art, processes, company and product names, and logos?
With a three-generation backup policy, the grandparent is which of the following?
the oldest copy of a file
what refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
what laws provide the same protection that covers mail and telephone communications to electronic communications such as voice mail?
electronic communications privacy act (ECPA)
what is a technique intruders use to make their network of internet transmissions appear legitimate to a victim computer or network?
what is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
What is the term for a website that uses encryption techniques to protect its data?
what is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
digital security risk
what kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
what kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
what is someone who uses the Internet or network to destroy or damage computers for political reasons?
Websites use which of the following to keep track of items in a user's shopping cart?
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
what s a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
what copies all of the files in a computer?
full back up
what kind of certificate is a notice that guarantees a user or website is legitimate?
Internet advertising firms often use what to collect information about users web browsing habits?
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
they restore the files
THIS SET IS OFTEN IN FOLDERS WITH...
FSU CGS 2060 Chapter 10
YOU MIGHT ALSO LIKE...
CGS 2060 Chapter 5
Personal Computing - Chapter 5
CS102 ch. 5
OTHER SETS BY THIS CREATOR
US Intelligence Policy Final FSU
Final Exam Duggleby
U.S. INTELLIGENCE FINAL