Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CIS 110 Chapter 5

2014 Digital Safety and Security

QuestionAnswer
A computer should be ____________ protected. password
With _________ storage, you can retrieve your data anytime from anywhere with internet connections. cloud
_____________ inspect data transmitted between a computer and external recipients to prevent unauthorized access to data. firewalls
____________ displays unwanted advertisements in a banner or pop-up. Adware
_________ is something that does something bad to your computer, and often comes in the form of viruses, Trojans, or worms. Malware
_________ are used by commercial web sites to customize web pages cookies
A _____ is used to take over a remote computer to perform malicious work by a hacker. bot
_____________ is software that is secretly installed on a computer, tracking and transmitting personal data without your knowledge and/or permission. spyware
_______ is a high-level encryption for wireless devices. WPA2
__________ is the term that is used to identify the computer user is who they say they are. authentication
Strong ___________ include upper, lower case characters, special symbols, numbers, and are not words that can be found in the dictionary. password
________ is your unique name to identify yourself to a computer system. username
Some _________are built into the operating systems. firewalls
_________ is a scam that appears to be an email with a genuine message or web site, but tries to get you to reveal sensitive, personal information. phishing
A ____ is a type of malware that spreads on its own, without human intervention. worm
________ is used to collect bits of information, such as your surfing habits. spyware
______ can easily be spread through e-mail attachments. virus
A slow internet connect can be the result of ___________. piggybacking
Intellectual ________ is a legal term for the ownership of an intangible asset, such as an idea. property
____ is also known as an end-user license agreement. EULA
_____ is the illegal copying and distribution of copyrighted software. piracy
____ is a technology used to fight software piracy and prevent unauthorized copying of digital content DRM
Energy ______ devices draw power even when they are turned off or in standby mode. vampire
It is ethical to download a presentation video from the _____________ and use it in a presentation. public domain
IT code of conduct lists ___________ things a computer can do on a computer system ethical
_________ is a group of programs, such as worms, virus, trojons and rootkits, that perform some "bad" service on your computer. malware
Digital certificates are valid for _____ years. two
To safeguard your personal information, it is recommended that you clear the ______ file when you are finished browsing the internet. history
Files are ___________ when backups are loaded back onto the computer. restored
A __________ DoS attack uses multiple unsuspecting computers to attack multiple computer networks. distributed
_________ is often used by advertising firms to collect information concerning browsing habits. spyware
Content ___________ is often used in business to limit employee's web access to certain sites. filtering
Many sites require a user to enter a _____, which is a private combination of characters associated with a user name that allows access to certain computer resources password
Approximately 25% of ________ connections are unsecured, leaving them susceptible to hackers. What was that percentage? wireless
A ___________ is a group of compromised computers connected to a network that attacks other networks botnet
The term _____ refers to the destructive event or prank the program is intended to deliver payload
You must first ________ encrypted data to turn it into a readable form. decrypt
Websites use a session _________ to keep track of items in a shopping cart. cookie
____________ is the software license for an individual user, and explains the terms of usage. EULA
Bots are used to perform a ________ task. bot
A _________ site uses encryption techniques to protect its data. secure
____________ is used to discover, collect, and analyze evidence found on computers and networks?. digital forensics
A ________ license is used to allow multiple users access to software on a server simultaneously. network
A ___ license is used to permits users to install the software on multiple computers, usually at a volume discount. site
___________ are used to record, save, an then execute a set of keystrokes and instructions repeatedly. macros
__________ refers to the rights in which creators are entitled to recognition/compensation for their work. intellectual property
A ____ backup copies all files in a computer. full
___________ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials? copyright
A script kiddie has the same intent as a _____, but does not have the technical skills and knowledge that the second group has. cracker
A certificate ___________ authenticates and verifies a person or company. authority
A digital security _____ is any event or action that could cause a loss of or damage to computer hardware, software, data, risk
A _________ is someone who demands payment in order to stop an attack on an organization’s technology infrastructure. cyberextorntionist
A cookie is a small ____ file that a web server stores on a user’s computer. text
A ____ provides the mobile user with a secure connection to the company network server? vpn
Information ___________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. privacy
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos. IP; intellectual property
Biometric devices are the most ______ method of identification and notification reliable
_______ describe a scam in which a website includes a button, image or link that contains a malicious program? clickjacking
___________ up refers to making a copy of the file. backing
Software used by cybercriminals is referred to as _______. crimeware
With a three-generation backup policy, the ______ is the oldest copy of the file. grandparent
________ backups are used when one is able to choose which folders and files to include in a backup. selective
__________ are effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters but impossible for computers to recognize. CAPTCHA
Product ________ uses an identification number that associates your new software purchase with the mobile device on which you installed the software activation
Created by: galvanl