What is a computer program that replicates itself and is often malicious?
A Virus.
100
It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
Malware
100
A physical device or application designed to deny incoming or outgoing traffic on a network.
Firewall
100
A string of characters that allows access to a computer, interface, or system.
Password.
100
What is a network administrator?
someone who is responsible for configuring a network system and managing its operations.
200
What is a worm?
Software that uses computer networks and security holes to replicate itself.
200
It is a type of malware that collects user information by tracking the habits of users.
Spyware
200
Application used to prevent infection from risks.
Antivirus software.
200
Define Authentication.
The process of verifying that "you are who you say you are"
200
What are 3 responsibilities of a network administrator?
Network configuration
Network design and supervision
Monitoring and filtering
Maintaining and securing
Updating and backing up
300
What is a computer program hidden within the shell of another program with an alternative intent such as a virus.
A Trojan Horse.
300
What does DOS stand for?
Denial of Service.
300
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
Adware
300
How can internet users remain educated about computer risks?
Internet resources
Public news networks
300
The overall design of a communications network is...
Network configuration?
400
What is a hacker?
It is a person who gains unauthorized access to a computing device or network.
400
What is a DOS attack?
An attempt to make a machine or network resource unavailable to its intended users.
400
Define Botnet
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
400
How often should you change your password?
Often; regularly.
400
What does NOS stand for?
Network operating system.
500
What is phishing?
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent.
500
What is identity fraud?
An attempt to use another person's identity to commit a crime.
500
Name three prevention methods for keeping your computer safe.
User awareness and education
Anti-virus software
Firewalls
Passwords
Authentication
500
What is the 2 step verification method?
A bank card and a PIN number is a two-step verification system.