click below
click below
Normal Size Small Size show me how
CIS 101- EXAM
PART SEVEN
| Question | Answer |
|---|---|
| 802.11i | "Sometimes called WPA2, a network standard developed by IEEE with enhanced security for wireless communications." |
| access control | "Security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer." |
| adware | "Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services." |
| anti-spam program | Program that attempts to remove spam before it reaches a user's inbox. |
| antivirus program | "Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files." |
| audit trail | Computer file that records both successful and unsuccessful access attempts. |
| back door | "Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network." |
| back up | To make a copy of a file. |
| backup | "Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed." |
| biometric device | "Device that authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic." |
| biometric payment | Payment method where the customer's fingerprint is read by a fingerprint scanner that is linked to a payment method such as a checking account or credit card. |
| botnet | "Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army." |
| CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated. |
| certificate authority (CA) | Authorized person or company that issues and verifies digital certificates. |
| clickjacking | "Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program." |
| computer addiction | Growing health problem that occurs when the computer consumes someone's entire social life. |
| computer crime | Any illegal act involving a computer. |
| computer ethics | Moral guidelines that govern the use of computers and information systems. |
| computer security risk | "Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability." |
| computer vision syndrome | Eyestrain due to prolonged computer usage. |
| content filtering | Process of restricting access to certain material on the Web. |
| cookie | Small text file that a Web server stores on a computer. |