Match each of the following terms to its meaning:
I. Trojan horse
II. pretexting
III. cookie
IV. botnet
V. time bomb
A) text file for storing personal preferences pertaining to websites
B) program that appears to be something useful or desirable
C) virus that is triggered by the passage of time or on a certain date
D) creating a scenario that sounds legitimate enough that someone will trust you
E) programs that run on a large number of zombie computers
Correct Answer:
Verified
Q25: Ethical hackers are also known as white-hat
Q37: A denial-of-service attack can be used to
Q46: Virtual private networks (VPNs) are secure networks
Q49: Currently, there are no antivirus programs for
Q57: An encryption virus replicates itself onto a
Q59: Since you can always redownload program files,
Q62: Another name for a sniffer is a(n)
Q65: Social _ is any technique that uses
Q65: Match each of the following terms to
Q82: _ alarm software is an inexpensive theft
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents