Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously? |
Network |
|
Which of the following categories are the rights to which creators are entitled for their work? |
Intellectual property |
|
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? |
Digital |
|
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? |
Phishing |
|
Which of the following provides the mobile user with a secure connection to the company network server? |
VPN |
|
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? |
Decryption |
|
With a three-generation backup policy, the grandparent is which of the following? |
Oldest copy of the file |
|
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount? |
site |
|
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure? |
Cyberextortionist |
|
Internet advertising firms often use which of the following to collect information about users web browsing habits? |
Spyware |
|
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them? |
Information privacy |
|
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? |
Digital security risk |
|
Which of the following is someone who uses the internet or network to destroy or damage computers for political reasons? |
Cyberterrorist |
|
Which encryption algorithm inserts characters between existing characters? |
expansion |
|
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? |
They restore the files |
|
Which of the following copies all of the files in a computer? |
Full backup |
|
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? |
IP |
|
With which of the following do users choose which folders and files to include in a backup? |
Selective backup |
|
Which of the following is an authorized person or company that issues and verifies digital certificates? |
Certificate authority? |
|
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? |
Malware |
|
What is the term for a website that uses encryption techniques to protect its data? |
Secure site |
|
Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network? |
spoofing |
|
Which of the following gives authors and artists to duplicate, publish and sell their materials? |
copyright |
|
Websites use which of the following to keep track of items in a user's shopping cart? |
Session cookie |
|
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications to electronic communications such as voice mail? |
Electronic Communications Privacy Act (ECPA) |