Identify the letter of the choice that best matches the phrase or definition.
A. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
B. A notice that guarantees a user or a website is legitimate.
C. An authorized person or company that issues and verifies digital certificates.
D. Any event or action that could cause a loss of or damage to computer or mobile device hardware.
E. Protects a network's resources from intrusion.
F. A group of compromised computers.
G. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
H. A scam in which a button or link on a website contains a malicious program.
I. Makes it illegal to circumvent antipiracy schemes in commercial software.
J. An assault whose purpose is to disrupt computer access to an Internet service
K. Outlines the activities for which a computer or network may and may not be used.
L. Biometric device used in high security areas.
M. A program that restricts access to specified websites.
N. Most systems require that a user selects this on his or her own.
O. Usually does not have advanced computer and technical skills.
P. In the encryption process, the encrypted (scrambled) data.
Q. In the encryption process, the unencrypted, readable data.
R. A program that performs a repetitive task on a network.
S. A common infringement of copyright.
T. Protects any tangible form of expression.
A. digital signature
B. digital certificate
C. CA
D. digital security risk
E. firewall
F. botnet
G. zombie
H. clickjacking
I. Digital Millennium Copyright Act (DCMA)
J. DoS attack
K. AUP
L. iris recognition system
M. web filtering software
N. password
O. script kiddie
P. ciphertext
Q. plaintext
R. bot
S. piracy
T. copyright
You might also like to view...
MC The text contained in a node can be accessed with its________attribute.
a) nodeValue attribute. b) value attribute. c) text attribute. d) None of the above.
When a user clicks the left mouse button on a control in a form, the ____ event is triggered.
A. Mouse Down B. Click C. Open D. Change
What are the purposes of the ENUM and TRIP protocols?
What will be an ideal response?
If the reviewing pane does not display, in the ________ group, click the reviewing pane button and then click reviewing pane vertical
A) Tracking B) Style C) Theme D) Building block