Products
Flashcards
Quiz Maker
Training Maker
See All
ProProfs.com
Products
Flashcards
Quiz Maker
Training Maker
See All
ProProfs.com
Related Flashcards
Take Flashcards
Popular
Recent
Language
Animal
Art
Assessment
Book
Business
Career
Celebrity
Computer
Country
Education
English
Exam
Food
Fun
Game
Geography
Health
History
Literature
Music
Math
Medical
Personality
Profession
Science
Society
Sports
Subject
Television
Create Flashcards
?
Take a Quiz
All Products
Brain Games
ProProfs.com
Home
›
Create
›
Flashcards
›
Science
›
Technology
›
What Are Various Technological Software Used Flashcards
›
Download View
Download (What Are Various Technological Software Used Flashcards) Flashcard
Choose a format below:
TEXT Format (.txt)
MS-Excel Format (.xls)
Select delimiter »
Comma
Semicolon
Tab
New Line
Custom
Preview »
Side A ------ Side B FOr complete protection when backing up your files, you should use a program that creates a_______ of your entire system. ------ image backup A )_______ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory. ------ stealth A computer virus normally attaches itself to another computer program known as a: ------ trojan horse Assigning IP addresses when users log on to their ISP is known as________. ------ dynamic addressing The most likely method a hacker would use to access a computer is: ------ entering through the internet Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called______ authentication devices. ------ biometric A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. ------ logic bomb Hackers who use their knowledge to break into systems just for the fun of it refer to themselves as _________ hackers. ------ white hat THe best defense against viruses is to install________ which is specifically designed to detect viruses and protect your computer and files from harm. ------ antivirus software _______ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud. ------ Phishing The malicious activity perpetrated by a Trojan horse program is often the installation of a _______ program. ------ backdoor A ______ is a virus that is attached to documents such as Word or Excel files. ------ macro virus A majority of online credit card fraud results from: ------ phishing Which of the following classifications of viruses can change its own code? ------ polymorphic _______ software can identify and eliminate known viruses effectively. ------ antivirus ______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. ------ Spyware A ______ virus can change its own code. ------ polymorphic During the process of ______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. ------ inoculation Unwanted, unsolicited e-mail is referred to as _______. ------ spam A ________ is the portion of virus code that is unique to a particular computer virus. ------ virus signature _______ makes broadband users more vulnerable to attacks. ------ Static addressing A _______ is a secure internet pathway that large corporations use to protect sensitive data. ------ virtual private network (VPN) _______ viruses compress common data files into a file using a complex key, rendering your files unusable. ------ encryption Which of the statements about protecting against power surges is FALSE? ------ printers do not require power surge protection A _______ is a portion of virus code that is unique to a particular computer virus. ------ virus signature All of the following approaches can be taken to protect your notebook computer from theft EXCEPT: ------ installing an external hard drive Hackers who use their knowledge to destroy information are known as _______ hackers. ------ black hat Configuring a firewall to deny packets sent to specific logical ports is referred to as _______. ------ packet filtering _______ occur when a Web site downloads harmful software onto your computer. ------ Drive-by downloads A person with malicious intent can take complete control of your computer by using a backdoor program. ------ TRUE Wireless networks are no more vulnerable to packet than are wired networks. ------ FALSE A _______ is composed of software programs known as robots or bots, which run automatically on zombie computers. ------ botnet The _______ is a program that executes whenever a computer boots up. ------ master boot record _______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. ------ phishing Many phtoocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves. ------ TRUE A _______ can help block unwanted, unsolicited e-mail. ------ spam filter A _______ backs up only the files on a computer that have changed since the last time a backup was performed. ------ incremental backup Which of the following is formally defined as any criminal action perpetrated primarily though the use of a computer? ------ cybercrime Instant messaging programs are susceptible to virus attacks. ------ TRUE _______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. ------ Phishing _______ are virtual communication paths that allow a computer to organize requests for information from other networks or computers. ------ logical ports You can block logical ports to invaders and make your computer invisible to others on the internet by installing: ------ a firewall _______ is a process used by firewalls to assign internal IP addresses on a network. ------ Network address translation and NAT A _______ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times. ------ logic bomb A _______ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer. ------ stealth Which of the following statements about cookies is NOT true? ------ cookies obtain your personal information by searching your hard drive. _______ is doing anything with a computer while you are being paid to do your job. ------ cyberloafing When electrical current is supplied in excess of normal voltage, this results in a _______. ------ power surge A ________ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge. ------ trojan horse Drive-by downloads occur when: ------ a web site downloads harmful software onto your computer. VPN stands for: ------ Virtual private network _______ floods a computer with requests until it shuts down and refuses to answer any requests for information. ------ A DDoS atack A _______ virus runs a program that searches for common data files, compresses them, and makes them unusable. ------ encryption A _______ works independently of host file execution and is much more active in spreading itself than a virus is. ------ worm As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as: ------ information quality control. Configuring a firewall to ignore all incoming packets that request access to a specific port is known as: ------ logical port blocking A virus's main purpose is to _______ itself and copy its code into as many other files as possible. ------ replicate All of the following can be used for backing up data files EXCEPT: ------ RAM _______ is characterized by someone using your personal information to assume your identity for the purpose of defrauding others. ------ identity theft The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. ------ FALSE A zombie is another person's computer controlled by a hacker. ------ TRUE _______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing a bluetooth device and stealing the information contained on it. ------ Bluesnarfing A _______ is a secure internet pathway that large corporations use to protect sensitive data. ------ VPN A hoax is referred to as a ________ after it becomes so well known that it is incorporated into society as if it were true. ------ urban legend The Windows utility that can automatically install security patches is called _______. ------ update with regard to computer protection, quarantining is defined as: ------ placing a found virus in a secure area on the hard drive _______ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make phone calls. ------ bluebugging _______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. ------ spyware Code issued by the manufacturer of software programs that repairs known security problems is referred to as a _______. ------ software patch and patch The purpose of network address translation (NAT) is to: ------ hide user IP addresses from the internet Using a _______, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with you computer. ------ backdoor program _______ occurs when a hacker takes control of a bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more. ------ bluebugging Which of these statements about physically protecting your computer is FALSE? ------ Data line surges can be blocked by using a computer surround. A cyberspace _______ is an attempt to make someone believe something that is untrue. ------ hoax For complete protection when backing up your files, you should use a program that creates a _______ of your entire system. ------ image backup If your IP address is always the same, you have a _______ address. ------ static For security reasons, you should be extremely wary of opening e-mail _______ such as Word files. ------ attachments Most often, hackers initiate a DDoS attack by creating and activating _______ computers. ------ zombie Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as: ------ keystroke loggers _______ is doing anything with a computer while you are being paid to do your job. ------ cyberloafing A _______ is defined as any criminal action perpetrated primarily through the use of a computer. ------ cybercrime A _______ virus is designed to infect multiple file types in an effort to fool antivirus software. ------ multipartite All computers connected to the internet have a unique address referred to as a _______. ------ Internet Protocol (IP) address Which of the following is a program that appears to be something useful or desirable but does something malicious in the background. ------ Trojan Horse Many _______ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT). ------ routers Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as_____. ------ keystroke loggers Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. ------ engineering A _______ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes. ------ packet sniffer Photocopiers do not present any vulnerability for potential hackers. ------ FALSE Young, amateur hackers are often referred to as _______. ------ script kiddies Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. ------ engineering Adware and spyware are referred to collectively as: ------ grayware During the process of _______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. ------ encryption A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: ------ launch a denial of service (DoS) attack on your computer. Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called _______. authentication devices. ------ biometric Which type of virus was the famous Michelangelo virus? ------ a time bomb A virus signature is a portion of virus code that is unique to a particular computer virus. ------ TRUE A _______ virus runs a program that searches for common data files, compresses them, and make them unusable. ------ encryption Rules for creating passwords include all of the following EXCEPT: ------ keep your password written down and stored in any easy-to-remember location File Transfer Protocol (FTP) uses port _______. ------ 21
Side A ------ Side B FOr complete protection when backing up your files, you should use a program that creates a_______ of your entire system. ------ image backup A )_______ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory. ------ stealth A computer virus normally attaches itself to another computer program known as a: ------ trojan horse Assigning IP addresses when users log on to their ISP is known as________. ------ dynamic addressing The most likely method a hacker would use to access a computer is: ------ entering through the internet Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called______ authentication devices. ------ biometric A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. ------ logic bomb Hackers who use their knowledge to break into systems just for the fun of it refer to themselves as _________ hackers. ------ white hat THe best defense against viruses is to install________ which is specifically designed to detect viruses and protect your computer and files from harm. ------ antivirus software _______ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud. ------ Phishing The malicious activity perpetrated by a Trojan horse program is often the installation of a _______ program. ------ backdoor A ______ is a virus that is attached to documents such as Word or Excel files. ------ macro virus A majority of online credit card fraud results from: ------ phishing Which of the following classifications of viruses can change its own code? ------ polymorphic _______ software can identify and eliminate known viruses effectively. ------ antivirus ______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. ------ Spyware A ______ virus can change its own code. ------ polymorphic During the process of ______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. ------ inoculation Unwanted, unsolicited e-mail is referred to as _______. ------ spam A ________ is the portion of virus code that is unique to a particular computer virus. ------ virus signature _______ makes broadband users more vulnerable to attacks. ------ Static addressing A _______ is a secure internet pathway that large corporations use to protect sensitive data. ------ virtual private network (VPN) _______ viruses compress common data files into a file using a complex key, rendering your files unusable. ------ encryption Which of the statements about protecting against power surges is FALSE? ------ printers do not require power surge protection A _______ is a portion of virus code that is unique to a particular computer virus. ------ virus signature All of the following approaches can be taken to protect your notebook computer from theft EXCEPT: ------ installing an external hard drive Hackers who use their knowledge to destroy information are known as _______ hackers. ------ black hat Configuring a firewall to deny packets sent to specific logical ports is referred to as _______. ------ packet filtering _______ occur when a Web site downloads harmful software onto your computer. ------ Drive-by downloads A person with malicious intent can take complete control of your computer by using a backdoor program. ------ TRUE Wireless networks are no more vulnerable to packet than are wired networks. ------ FALSE A _______ is composed of software programs known as robots or bots, which run automatically on zombie computers. ------ botnet The _______ is a program that executes whenever a computer boots up. ------ master boot record _______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. ------ phishing Many phtoocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves. ------ TRUE A _______ can help block unwanted, unsolicited e-mail. ------ spam filter A _______ backs up only the files on a computer that have changed since the last time a backup was performed. ------ incremental backup Which of the following is formally defined as any criminal action perpetrated primarily though the use of a computer? ------ cybercrime Instant messaging programs are susceptible to virus attacks. ------ TRUE _______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. ------ Phishing _______ are virtual communication paths that allow a computer to organize requests for information from other networks or computers. ------ logical ports You can block logical ports to invaders and make your computer invisible to others on the internet by installing: ------ a firewall _______ is a process used by firewalls to assign internal IP addresses on a network. ------ Network address translation and NAT A _______ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times. ------ logic bomb A _______ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer. ------ stealth Which of the following statements about cookies is NOT true? ------ cookies obtain your personal information by searching your hard drive. _______ is doing anything with a computer while you are being paid to do your job. ------ cyberloafing When electrical current is supplied in excess of normal voltage, this results in a _______. ------ power surge A ________ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge. ------ trojan horse Drive-by downloads occur when: ------ a web site downloads harmful software onto your computer. VPN stands for: ------ Virtual private network _______ floods a computer with requests until it shuts down and refuses to answer any requests for information. ------ A DDoS atack A _______ virus runs a program that searches for common data files, compresses them, and makes them unusable. ------ encryption A _______ works independently of host file execution and is much more active in spreading itself than a virus is. ------ worm As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as: ------ information quality control. Configuring a firewall to ignore all incoming packets that request access to a specific port is known as: ------ logical port blocking A virus's main purpose is to _______ itself and copy its code into as many other files as possible. ------ replicate All of the following can be used for backing up data files EXCEPT: ------ RAM _______ is characterized by someone using your personal information to assume your identity for the purpose of defrauding others. ------ identity theft The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. ------ FALSE A zombie is another person's computer controlled by a hacker. ------ TRUE _______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing a bluetooth device and stealing the information contained on it. ------ Bluesnarfing A _______ is a secure internet pathway that large corporations use to protect sensitive data. ------ VPN A hoax is referred to as a ________ after it becomes so well known that it is incorporated into society as if it were true. ------ urban legend The Windows utility that can automatically install security patches is called _______. ------ update with regard to computer protection, quarantining is defined as: ------ placing a found virus in a secure area on the hard drive _______ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make phone calls. ------ bluebugging _______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. ------ spyware Code issued by the manufacturer of software programs that repairs known security problems is referred to as a _______. ------ software patch and patch The purpose of network address translation (NAT) is to: ------ hide user IP addresses from the internet Using a _______, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with you computer. ------ backdoor program _______ occurs when a hacker takes control of a bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more. ------ bluebugging Which of these statements about physically protecting your computer is FALSE? ------ Data line surges can be blocked by using a computer surround. A cyberspace _______ is an attempt to make someone believe something that is untrue. ------ hoax For complete protection when backing up your files, you should use a program that creates a _______ of your entire system. ------ image backup If your IP address is always the same, you have a _______ address. ------ static For security reasons, you should be extremely wary of opening e-mail _______ such as Word files. ------ attachments Most often, hackers initiate a DDoS attack by creating and activating _______ computers. ------ zombie Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as: ------ keystroke loggers _______ is doing anything with a computer while you are being paid to do your job. ------ cyberloafing A _______ is defined as any criminal action perpetrated primarily through the use of a computer. ------ cybercrime A _______ virus is designed to infect multiple file types in an effort to fool antivirus software. ------ multipartite All computers connected to the internet have a unique address referred to as a _______. ------ Internet Protocol (IP) address Which of the following is a program that appears to be something useful or desirable but does something malicious in the background. ------ Trojan Horse Many _______ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT). ------ routers Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as_____. ------ keystroke loggers Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. ------ engineering A _______ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes. ------ packet sniffer Photocopiers do not present any vulnerability for potential hackers. ------ FALSE Young, amateur hackers are often referred to as _______. ------ script kiddies Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. ------ engineering Adware and spyware are referred to collectively as: ------ grayware During the process of _______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. ------ encryption A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: ------ launch a denial of service (DoS) attack on your computer. Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called _______. authentication devices. ------ biometric Which type of virus was the famous Michelangelo virus? ------ a time bomb A virus signature is a portion of virus code that is unique to a particular computer virus. ------ TRUE A _______ virus runs a program that searches for common data files, compresses them, and make them unusable. ------ encryption Rules for creating passwords include all of the following EXCEPT: ------ keep your password written down and stored in any easy-to-remember location File Transfer Protocol (FTP) uses port _______. ------ 21
Everything is ready!
Let’s click on download button to download score report in Microsoft Excel format (.xls file).