Matching
Match each item with a statement below.
Premises:
a code used to identify and authenticate a person or organization sending data over a network
A type of malware that tricks you into opening it by substituting itself for a legitimate program
when someone who is unauthorized follows the employee through a secured entrance to a room or building
A program that is potentially harmful or potentially unwanted
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
an attack that can be used to crack a long password by trying words and word combinations
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
type of spyware that tracks your keystrokes, including passwords
software installed on a computer that produces pop-up ads using your browser
Responses:
dictionary attack
digital certificate
keylogger
grayware
tailgating
adware
social engineering
Trojan
zombie
worm
Correct Answer:
Premises:
Responses:
a code used to identify and authenticate a person or organization sending data over a network
A type of malware that tricks you into opening it by substituting itself for a legitimate program
when someone who is unauthorized follows the employee through a secured entrance to a room or building
A program that is potentially harmful or potentially unwanted
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
an attack that can be used to crack a long password by trying words and word combinations
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
type of spyware that tracks your keystrokes, including passwords
software installed on a computer that produces pop-up ads using your browser
Premises:
a code used to identify and authenticate a person or organization sending data over a network
A type of malware that tricks you into opening it by substituting itself for a legitimate program
when someone who is unauthorized follows the employee through a secured entrance to a room or building
A program that is potentially harmful or potentially unwanted
the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer
an attack that can be used to crack a long password by trying words and word combinations
a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
type of spyware that tracks your keystrokes, including passwords
software installed on a computer that produces pop-up ads using your browser
Responses:
Related Questions
Q3: Anti-malware software relies on what sort of
Q4: On a peer-to-peer network, authentication is the
Q6: What technology can be used to locate
Q11: If you want your computer to be
Q22: A person that secretly peaks at your
Q31: Documentation for evidence which includes exactly what,
Q41: What are the risks in using BitLocker
Q42: If you wish to monitor logon failures,
Q43: Describe Windows Firewall.
Q45: What is a Trojan, and how is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents