This is commonly packaged with a new computer system.
What is a Rescue Disk
100
This type of permissions provide registered users with access to the files they need, while restricting access to private resources.
What is User Permissions
100
Worms, viruses, and spyware are examples of this.
What is Malware
100
The type of site that searches several search engines at once is a ____.
What is a Meta Search Engine
100
Through the use of a ____, users can freely express their views and opinions.
What is a blog
200
Businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
What is Mirroring or RAID
Redundant Array of Independant Disks
200
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of what?
What is unintentional data-entry error
200
These are the colors of the hats of hackers that categorize what side of security they're on
What are White, Grey, and Black
200
Human-powered search provides search results created by human researchers, therefore they are more ___.
What is accurate
200
A Web ____ is also referred to as a customized Web home page.
What is a Portal
300
An item such as a smart card is an example of this form of authentication.
What is Something You Have
300
This person's job is to oversee and manage a company’s computer network.
What is a Network Administrator
300
This type of computer has had a "back door" unknowingly put on it, allowing attackers to connect to it and remotely control it
What is a Zombie Computer
300
A spider is also called a ___.
What is a Bot
300
The online community taking journalism into its own hands is known as ____ _____.
What is Social or citizen journalism.
400
This is an individual who illegally downloads copyright-protected software.
What is a Pirate
400
This type of Malware self replicates and spreads itself across a network, commonly through Email.
What is a Worm
400
An e-mail with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of this type of scam.
What is Phishing
400
A search engine attempts to catalog every Web page by topic through the use of a ____.
What is a Spider
400
____ refer(s) to online services that support social interaction and publishing.
What is Social Media
500
This is the most common form of authentication.
What is a Password
500
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
What is Network Usage Policy
500
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the Web.
What is SSL
Secure Socket Layer
500
A search phrase is defined by double ____.
What is quotes
500
____ communication requires all participants to be engaged in communication at the same time.