Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 22 Software

TermDefinition
Security Guards physical security for your installation should begin with personnel - specifically, and security-focused personnel
Mantraps helps to prevent users from tailgating
biometrics use physical characteristics to identify the user
Hardware Tokens used to access network resources
Cable locks used to secure laptops
Full Control gives the user all the other permissions as well as permission to take ownership and change permission
Modify Combines the Read & Execute permission with the write permission and further allows the user to delete the file
Read Allows the user to view the contents of the file and to see ownership and attributes
Read & Execute Combines the Read permission with the ability to execute
Write Allows the user to overwrite the file as well as to change attributes and see ownership and permissions
Object class objects can be organized based on their class or type
Geographic Location objects can be organized based off of location
Function Objects can be organized based on their function in the organization,such as servers,workstations, and users
Hybrid have to stick to one organization of objects
Social engineering attacks is the process in which an attacker attempts to acquire information about your network and system by social means,such as talking to people in the organization
Spoofing attacks is an attempt by someone or something to masquerade as someone else
Armored Virus is designed to make itself difficult to detect or analyze
Companion Virus attaches itself to legitimate programs and then creates a program with a different filename extension
Macro Virus exploits the enhancements made to many application programs
Multipartite Virus attacks your system in multiple ways. Such as destroy your application files, boot sector,and word documents
Phage Virus alters programs and databases
Polymorphic Virus change form to avoid detection
Retrovirus attacks or bypasses the antivirus software installed on a computer
Stealth Virus attempts to avoid detection by masking itself from applications
Created by: mschmitz
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards