Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering Computers 2008
Quiz 11: Computer Security, Ethics, and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 141
Short Answer
Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a private combination of characters associated with a user name that allows access to certain computer resources.
Question 142
Short Answer
A more devastating type of DoS attack is the ____________________, in which multiple unsuspecting computers are used to attack multiple computer networks.
Question 143
Short Answer
A(n) ____________________ is a company or person a user believes will not send a virus-infected file knowingly.
Question 144
Short Answer
A(n) ____________________ has the same intent as a cracker, but does not have the technical skills and knowledge.
Question 145
Short Answer
____________________ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.
Question 146
Short Answer
Software ____________________ is the unauthorized and illegal duplication of copyrighted software.
Question 147
Short Answer
____________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.