Matching
Matching :
Premises:
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
a code used to identify and authenticate a person or organization sending data over a network
a program that AV software recognizes to be potentially harmful or potentially unwanted
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
type of smart card that contains authentication information
software installed on a computer that produces pop-up ads using your browser
A type of malware that tricks you into opening it by substituting itself for a legitimate program
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
when someone who is unauthorized follows the employee through a secured entrance to a room or building
type of spyware that tracks your keystrokes, including passwords
Responses:
virus signature
worm
social engineering
Trojan
keylogger
RSA tokens
adware
grayware
digital certificate
tailgating
Correct Answer:
Premises:
Responses:
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
a code used to identify and authenticate a person or organization sending data over a network
a program that AV software recognizes to be potentially harmful or potentially unwanted
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
type of smart card that contains authentication information
software installed on a computer that produces pop-up ads using your browser
A type of malware that tricks you into opening it by substituting itself for a legitimate program
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
when someone who is unauthorized follows the employee through a secured entrance to a room or building
type of spyware that tracks your keystrokes, including passwords
Premises:
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
a code used to identify and authenticate a person or organization sending data over a network
a program that AV software recognizes to be potentially harmful or potentially unwanted
a set of distinguishing characteristics of a virus used by antivirus software to identify new viruses as they get into the wild
type of smart card that contains authentication information
software installed on a computer that produces pop-up ads using your browser
A type of malware that tricks you into opening it by substituting itself for a legitimate program
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
when someone who is unauthorized follows the employee through a secured entrance to a room or building
type of spyware that tracks your keystrokes, including passwords
Responses:
Related Questions
Q20: Which of the following is NOT true
Q22: There are eight criteria for creating a
Q23: To keep a system secure from tailgating,
Q26: Windows _ is antispyware included in Windows
Q28: The _ account is disabled by default
Q29: What are two methods users can use
Q30: To prevent spread of malware, an infected
Q41: What are the risks in using BitLocker
Q48: Describe file and folder encryption in Windows
Q49: With respect to the default users and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents