Solved

Identify the Letter of the Choice That Best Matches the Phrase

Question 81

Matching

Identify the letter of the choice that best matches the phrase or definition.

Premises:
In the encryption process, the encrypted (scrambled) data
In the encryption process, the unencrypted, readable data
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Protects a network's resources from intrusion
Hacker who usually does not have advanced computer and technical skills
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
Any event or action that could cause a loss of or damage to computer or mobile device hardware
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
A notice that guarantees a user or a website is legitimate
A program that performs a repetitive task on a network
An authorized person or company that issues and verifies digital certificates
An assault whose purpose is to disrupt computer access to an Internet service
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program
Responses:
digital security risk
clickjacking
script kiddie
bot
digital signature
piracy
ciphertext
CA
firewall
digital certificate
zombie
DoS attack
plaintext
AUP
botnet

Correct Answer:

In the encryption process, the encrypted (scrambled) data
In the encryption process, the unencrypted, readable data
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Protects a network's resources from intrusion
Hacker who usually does not have advanced computer and technical skills
A group of compromised computers
The unauthorized and illegal duplication of copyrighted software
Any event or action that could cause a loss of or damage to computer or mobile device hardware
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
A notice that guarantees a user or a website is legitimate
A program that performs a repetitive task on a network
An authorized person or company that issues and verifies digital certificates
An assault whose purpose is to disrupt computer access to an Internet service
Outlines the activities for which a computer or network may and may not be used
A scam in which a button or link on a website contains a malicious program
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents