Solved

Identify the Letter of the Choice That Best Matches the Phrase

Question 163

Matching

Identify the letter of the choice that best matches the phrase or definition.

Premises:
A notice that guarantees a user or a website is legitimate.
A common infringement of copyright.
A scam in which a button or link on a website contains a malicious program.
Most systems require that a user selects this on his or her own.
Protects any tangible form of expression.
In the encryption process, the unencrypted, readable data.
A program that performs a repetitive task on a network.
A program that restricts access to specified websites.
Protects a network's resources from intrusion.
Usually does not have advanced computer and technical skills.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
In the encryption process, the encrypted (scrambled) data.
An assault whose purpose is to disrupt computer access to an Internet service
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
A group of compromised computers.
Outlines the activities for which a computer or network may and may not be used.
Biometric device used in high security areas.
An authorized person or company that issues and verifies digital certificates.
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses:
botnet
digital security risk
digital signature
DoS attack
Digital Millennium Copyright Act (DCMA)
digital certificate
piracy
ciphertext
plaintext
iris recognition system
password
CA
web filtering software
script kiddie
copyright
clickjacking
AUP
firewall
zombie
bot

Correct Answer:

A notice that guarantees a user or a website is legitimate.
A common infringement of copyright.
A scam in which a button or link on a website contains a malicious program.
Most systems require that a user selects this on his or her own.
Protects any tangible form of expression.
In the encryption process, the unencrypted, readable data.
A program that performs a repetitive task on a network.
A program that restricts access to specified websites.
Protects a network's resources from intrusion.
Usually does not have advanced computer and technical skills.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
In the encryption process, the encrypted (scrambled) data.
An assault whose purpose is to disrupt computer access to an Internet service
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
A group of compromised computers.
Outlines the activities for which a computer or network may and may not be used.
Biometric device used in high security areas.
An authorized person or company that issues and verifies digital certificates.
Makes it illegal to circumvent antipiracy schemes in commercial software.
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents