Chapter 4
Chapter 4
Chapter 5
Chapter 6
Chaoter 6
100

Small amounts of information that Web sites store on your computer, temporarily or more or less permanently

What are cookies?

100

The likelihood that a threat will occur

What is risk?

100

A binary digit- that is, a 0 or 1

What is a bit?

100

A massive global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents

What is the Internet?

100

Collectively, all of the Web pages of a particular company or individual

What is a Web site?

200

Malicious software such as a virus or worm

What is malware?

200

A system (hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network

What is a firewall?

200

Each row in a relational table, which is a specific, unique representation of the entity

What is an instance?

200

A network, generally provided by common carriers, that covers a wide geographical area

What is a wide area network (WAN)?

200

Device that converts signals from analog to digital and vice versa

What is a modem?

300

The process of converting an original message into a form that cannot be read by anyone except the intended receiver

What is encryption?

300

Alien software that uses your computer as a launch platform for spammers

What is spamware?

300

A field that has some identifying information, but typically does not uniquely identify a record with complete accuracy

What is a secondary key?

300

Computers that act as exchnage points for internet traffic and determine how internet traffice is routed

What are network access points (NAPs)?

300

A private network that uses Internet software and TCP/IP protocols

What is an intranet?

400

A private network that uses a public network (usually the Internet) to securely connect users by using encryption

What is a virtual private network (VPN)?

400

A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity

What is whitelisting?

400

Storage of data in more than two dimensions

What is multidimensional data?

400

The transmission technology that divides blocks of text into packets

What is packet switching?

400

A computer program that searches for specific information by keywords and reports the results

What is a search engine?

500

A cyberattack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

What is a denial-of-service attack?

500

An encryption standard used for secure transactions such as credit card purchases and online banking, also known as transport layer security

What is a secure socket layer (SSL)?

500

Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site

What is clickstream data?

500

A file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted

What is Transmission Control Protocol/Internet Protocol (TCP/IP)?

500
A communications medium consisting of strands of copper wire twisted together in pairs

What is twisted-pair wire?

M
e
n
u