Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

2014 Digital Safety and Security

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
A computer should be ____________ protected.   password  
🗑
With _________ storage, you can retrieve your data anytime from anywhere with internet connections.   cloud  
🗑
_____________ inspect data transmitted between a computer and external recipients to prevent unauthorized access to data.   firewalls  
🗑
____________ displays unwanted advertisements in a banner or pop-up.   Adware  
🗑
_________ is something that does something bad to your computer, and often comes in the form of viruses, Trojans, or worms.   Malware  
🗑
_________ are used by commercial web sites to customize web pages   cookies  
🗑
A _____ is used to take over a remote computer to perform malicious work by a hacker.   bot  
🗑
_____________ is software that is secretly installed on a computer, tracking and transmitting personal data without your knowledge and/or permission.   spyware  
🗑
_______ is a high-level encryption for wireless devices.   WPA2  
🗑
__________ is the term that is used to identify the computer user is who they say they are.   authentication  
🗑
Strong ___________ include upper, lower case characters, special symbols, numbers, and are not words that can be found in the dictionary.   password  
🗑
________ is your unique name to identify yourself to a computer system.   username  
🗑
Some _________are built into the operating systems.   firewalls  
🗑
_________ is a scam that appears to be an email with a genuine message or web site, but tries to get you to reveal sensitive, personal information.   phishing  
🗑
A ____ is a type of malware that spreads on its own, without human intervention.   worm  
🗑
________ is used to collect bits of information, such as your surfing habits.   spyware  
🗑
______ can easily be spread through e-mail attachments.   virus  
🗑
A slow internet connect can be the result of ___________.   piggybacking  
🗑
Intellectual ________ is a legal term for the ownership of an intangible asset, such as an idea.   property  
🗑
____ is also known as an end-user license agreement.   EULA  
🗑
_____ is the illegal copying and distribution of copyrighted software.   piracy  
🗑
____ is a technology used to fight software piracy and prevent unauthorized copying of digital content   DRM  
🗑
Energy ______ devices draw power even when they are turned off or in standby mode.   vampire  
🗑
It is ethical to download a presentation video from the _____________ and use it in a presentation.   public domain  
🗑
IT code of conduct lists ___________ things a computer can do on a computer system   ethical  
🗑
_________ is a group of programs, such as worms, virus, trojons and rootkits, that perform some "bad" service on your computer.   malware  
🗑
Digital certificates are valid for _____ years.   two  
🗑
To safeguard your personal information, it is recommended that you clear the ______ file when you are finished browsing the internet.   history  
🗑
Files are ___________ when backups are loaded back onto the computer.   restored  
🗑
A __________ DoS attack uses multiple unsuspecting computers to attack multiple computer networks.   distributed  
🗑
_________ is often used by advertising firms to collect information concerning browsing habits.   spyware  
🗑
Content ___________ is often used in business to limit employee's web access to certain sites.   filtering  
🗑
Many sites require a user to enter a _____, which is a private combination of characters associated with a user name that allows access to certain computer resources   password  
🗑
Approximately 25% of ________ connections are unsecured, leaving them susceptible to hackers. What was that percentage?   wireless  
🗑
A ___________ is a group of compromised computers connected to a network that attacks other networks   botnet  
🗑
The term _____ refers to the destructive event or prank the program is intended to deliver   payload  
🗑
You must first ________ encrypted data to turn it into a readable form.   decrypt  
🗑
Websites use a session _________ to keep track of items in a shopping cart.   cookie  
🗑
____________ is the software license for an individual user, and explains the terms of usage.   EULA  
🗑
Bots are used to perform a ________ task.   bot  
🗑
A _________ site uses encryption techniques to protect its data.   secure  
🗑
____________ is used to discover, collect, and analyze evidence found on computers and networks?.   digital forensics  
🗑
A ________ license is used to allow multiple users access to software on a server simultaneously.   network  
🗑
A ___ license is used to permits users to install the software on multiple computers, usually at a volume discount.   site  
🗑
___________ are used to record, save, an then execute a set of keystrokes and instructions repeatedly.   macros  
🗑
__________ refers to the rights in which creators are entitled to recognition/compensation for their work.   intellectual property  
🗑
A ____ backup copies all files in a computer.   full  
🗑
___________ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?   copyright  
🗑
A script kiddie has the same intent as a _____, but does not have the technical skills and knowledge that the second group has.   cracker  
🗑
A certificate ___________ authenticates and verifies a person or company.   authority  
🗑
A digital security _____ is any event or action that could cause a loss of or damage to computer hardware, software, data,   risk  
🗑
A _________ is someone who demands payment in order to stop an attack on an organization’s technology infrastructure.   cyberextorntionist  
🗑
A cookie is a small ____ file that a web server stores on a user’s computer.   text  
🗑
A ____ provides the mobile user with a secure connection to the company network server?   vpn  
🗑
Information ___________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.   privacy  
🗑
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.   IP; intellectual property  
🗑
Biometric devices are the most ______ method of identification and notification   reliable  
🗑
_______ describe a scam in which a website includes a button, image or link that contains a malicious program?   clickjacking  
🗑
___________ up refers to making a copy of the file.   backing  
🗑
Software used by cybercriminals is referred to as _______.   crimeware  
🗑
With a three-generation backup policy, the ______ is the oldest copy of the file.   grandparent  
🗑
________ backups are used when one is able to choose which folders and files to include in a backup.   selective  
🗑
__________ are effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters but impossible for computers to recognize.   CAPTCHA  
🗑
Product ________ uses an identification number that associates your new software purchase with the mobile device on which you installed the software   activation  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: galvanl
Popular Computers sets