Matching
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A scam in which a button or link on a Web site contains a malicious program.
A common infringement of copyright.
Usually does not have advanced computer and technical skills.
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
It fails to define a legitimate business need.
Protects a network's resources from intrusion.
A group of compromised computers.
In the encryption process, the encrypted (scrambled) data.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
A notice that guarantees a user or a Web site is legitimate.
Most systems require that a user selects this on his or her own.
Hidden on Web pages in the form of graphical images
In the encryption process, the unencrypted, readable data.
Protects any tangible form of expression.
An authorized person or company that issues and verifies digital certificates.
Responses:
plaintext
Digital Millennium Copyright Act (DCMA)
firewall
copyright
zombie
digital signature
clickjacking
script kiddie
ciphertext
CA
password
CTS
noise
botnet
digital certificate
Fair Credit Reporting Act
piracy
virus hoax
Web bug
CAN-SPAM Act
Correct Answer:
Premises:
Responses:
A scam in which a button or link on a Web site contains a malicious program.
A common infringement of copyright.
Usually does not have advanced computer and technical skills.
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
It fails to define a legitimate business need.
Protects a network's resources from intrusion.
A group of compromised computers.
In the encryption process, the encrypted (scrambled) data.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
A notice that guarantees a user or a Web site is legitimate.
Most systems require that a user selects this on his or her own.
Hidden on Web pages in the form of graphical images
In the encryption process, the unencrypted, readable data.
Protects any tangible form of expression.
An authorized person or company that issues and verifies digital certificates.
Premises:
A scam in which a button or link on a Web site contains a malicious program.
A common infringement of copyright.
Usually does not have advanced computer and technical skills.
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
It fails to define a legitimate business need.
Protects a network's resources from intrusion.
A group of compromised computers.
In the encryption process, the encrypted (scrambled) data.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
A notice that guarantees a user or a Web site is legitimate.
Most systems require that a user selects this on his or her own.
Hidden on Web pages in the form of graphical images
In the encryption process, the unencrypted, readable data.
Protects any tangible form of expression.
An authorized person or company that issues and verifies digital certificates.
Responses:
Related Questions
Q146: A(n) _ is a program or set
Q149: A(n) _ control is a security measure
Q156: The computer that a hacker uses for
Q159: Computer viruses, worms, and Trojan horses deliver
Q159: A(n) _ device authenticates a person's identity
Q160: Spim are messages like those in the
Q162: _ is the process of converting readable
Q164: Software _ is a fairly simple crime
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents