0% found this document useful (0 votes)
112 views6 pages

Cybersecurity Terms and Concepts Guide

1. A firewall restricts transmissions from outside but allows inside users to access the internet. A worm copies itself repeatedly using resources, possibly crashing systems. A VPN provides secure connection to company network. Audit software monitors computer activity. A DOS attack overloads servers to disrupt legitimate transmissions. A UPS protects against power failures. Identity theft involves unauthorized charges on credit cards. A surge protector shields equipment from power spikes. A virus negatively impacts computers without permission. Hardware vandalism involves physical damage. A time bomb activates on a special event or time. A surge protector provides stable current. Antivirus programs find and remove viruses. A digital signature verifies the sender. A cracker illegally accesses to destroy or steal

Uploaded by

Ahmed Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views6 pages

Cybersecurity Terms and Concepts Guide

1. A firewall restricts transmissions from outside but allows inside users to access the internet. A worm copies itself repeatedly using resources, possibly crashing systems. A VPN provides secure connection to company network. Audit software monitors computer activity. A DOS attack overloads servers to disrupt legitimate transmissions. A UPS protects against power failures. Identity theft involves unauthorized charges on credit cards. A surge protector shields equipment from power spikes. A virus negatively impacts computers without permission. Hardware vandalism involves physical damage. A time bomb activates on a special event or time. A surge protector provides stable current. Antivirus programs find and remove viruses. A digital signature verifies the sender. A cracker illegally accesses to destroy or steal

Uploaded by

Ahmed Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1- A (firewall) is a computer program that permits a user on the internal network to access the internet

but severely restricts transmissions from the outside

2- A (system failure) is the prolonged malfunction of a computer

3- A (worm) is a program that copies itself repeatedly in memory or on a network, using up resources
and possibly shutting down the computer or network

4-A (VPN) provides the mobile user with a secure connection to the company network server

5- (Audit control) software monitors and records computer activity

6- A computer (security risk) is an event, action, or situation that can lead to the loss or destruction of
computer systems or their data

7- An internet (denial of service) attack occurs when an internet server is purposely overloaded so that
it cannot process legitimate transmissions

8- A (uninterruptible power supply) can protect computers from data loss during power failures

9- A (worm) is a program that does NOT have to be executed in order to propagate over a network

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you
may have been the victim of (identity theft)

11- A (surge protector) shield electronic equipment from power spikes

12- A computer (virus) is a potentially damaging computer program that affects, or infects, a computer
negatively by altering the way the computer works without the user’s knowledge or permission

13- A person breaking into a computer laboratory and smashing computers is an example of
(hardware vandalism)

14- A destructive program that remains on a computer system until the occurrence of special event or
time is called a (Time bomb)

15- A (surge protector) uses special electrical components to provide a stable current flow to the
computer and other electronic equipment

16- (Antivirus programs) are designed to search for viruses, notify users when they’re found, and
remove them from infected disks or files

17- A (digital signature) is an encrypted code that a person, website, or organization attaches to an
electronic message to verify the identity the sender

18- A (cracker) is someone who accesses a computer or network illegally but has the intent of destroying
data, stealing information, or other malicious action
19- A (Trojan horse) is a malicious – logic program that hides within or looks a legitimate program and
usually is triggered by a certain condition or action

20- A (cyber terrorist) is someone who uses the internet to destroy or damage computers for political
reasons

21- Another name for a time bomb is a (logic) bomb

22- A (rootkit) is a program that hides in a computer and allows someone from a remote location to
take full control of the computer

23- A (uninterruptible power supply) is a battery-powers piece of equipment that provides backup
power to a computer for a limited time

24- A (cyberextortionist) is someone who uses e-mail as a vehicle for extortion

25- Breaking into other computer system is called (Electronic trespassing)

26- (Corporate spies) are hired to break into a specific computer and steal its proprietary data

27- Crimes that use the internet are called (cybercrimes)

28- Code hidden within a program that damages or destroys files is called a computer (virus)

29- (Denial of service (dos)) attacks bombard servers and web sites with traffic that shuts down
networks

30- (Employee monitoring) allows an employer to observe employee phone calls, e-mails, and Web
browsing

31-(encryption) is the process of converting readable data into unreadable characters to prevent
unauthorized access

32- Firewalls are used to (restrict outsiders from accessing internal data)

33- (Information theft) occurs when someone steals personal or confidential information

34- In which type of attack does the attacker poses as a legitimate company in an e-mail or website
(phishing)

35- Malicious software is known as (malware)

36- Many web sites require a user to enter a (username), which is a unique combination of characters,
such as letters of alphabet or numbers that identifies one specific user

37- of the currently employed access control methods, (biometric authentication) is the most secure,
because it involves identification of the user’s body, such as his or her eyes or fingerprints
38- (Spoofing) is a technique intruders use to make their network or internet transmission appear
legitimate to a victim computer or network

39- (Spyware) is technology that collects information from computer users without their knowledge or
consent

40- (Software theft) occurs when someone steals software media, intestinally erase programs, or
illegally copies a program

41- The scrambling of code is known as (encryption)

42- The term malware is short for (malicious software)

43-The ability to convey a message without disclosing your name or identity is known as (anonymity)

44- To safeguard your equipment and data against power-related issues, you should always use a (surge
protector)

45-This type of software collects your personal information, monitors your web surfing habits and
distributes this information to a third party (spyware)

46-The ability to convey a message without disclosing your name or identity is known as (anonymity)

47- Using a technique known as (IP spoofing) a message is sent to a computer system using an IP
address disguised as one from a trusted source

48- (Unethical employees) break into their employer’s computers for a variety of reasons to exploit a
security weakness, to seek financial gain from selling confidential information, on to take revenge

49- What do you call a piece of code that attaches to an applications program and secretly spreads when
the application program is executes (Virus)

50- What do you call a program that secretly records information about a computer user’s activities and
sends it out over the internet (Spybot)

51- What do you call a person who access a computer without authorization (Hacker)

52- What do you call a program that perform a useful task while at the same time carrying out some
secret destructive act (Trojan horse)

53- What is the best definition of a computer hacker (A hacker is a person who investigates a computer
system to understand both its full capabilities and vulnerabilities)

54- What do you call a program that has the ability to execute independently and spread over a
computer network? (Worm)

55- Which of the following best describes web bug (a component of a web page that tracks and collects
information about visitors)
56- What is the study of converting information into encoded or scrambled formats called
(Cryptography)

57- Which type of rogue program is disguised as a useful program but contains hidden instructions to
perform a malicious task (Trojan horse)

58- Which of the following best describes a web bug (A component of a web page that tracks and
collects information about visitors)

59- Which of the following passwords provides the most secure choice (3R2Wvx8@)

60- What is the best definition of a cookie (It is a plain-text file written to your hard disk by a web site
you visit)

61- Which of the following groups of people present the greatest threat to a company’s information
structure (Company insiders)

62- Which of the following is true of cookies (They help companies track browsing habits and
preferences of users)

63- Which of the following NOT a technique you can effectively use to reduce the amount of
unauthorized email on your computer (Reply to spam and ask to be removed from the mailing list)

64- A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge
1- A DOS attack is a technique intruders use to make their network or internet transmission
appear legitimate to a victim computer or network (×)

2- A message that has been coded with an encryption key is referred to as encrypto – text (×)

3- A digital signature guarantees that a message has not been tampered with (√)

4- A cyberextortionist is someone who uses the internet or a network to destroy or damage


computers (×)

5- All new cell phones have GPS awareness (√)

6- Before it is encrypted, a readable message is known as ciphertext (×)

7- Computer forensics is a form of computer crime (×)

8- Computer crime often goes unreported because businesses fear negative publicity (√)

9- In general, computer viruses don’t discriminate among operating systems; a typical virus can infect
any system, regardless of platform (×)

10- Information can be recovered from a hard drive even after file have been deleted (√)

11- IP spoofing takes place when hacker sends a message with an IP address disguised as an incoming
message (√)

12- Malware includes spyware, computer viruses and various rogue programs (√)

13- Organized crime and terrorist organizations aren’t likely to commit computer crimes because they
don’t have the expertise (×)

14- Private Key encryption is considered essential for e-commerce (×)

15- Personal firewalls are programs of devices that protect home computers from unauthorized access
(√)

16-Privacy and computer crime are the same (×)

17- Security procedures eliminate all risks to computers (√)

18- Smart cards and biometrics are two ways companies may add physical security to computer systems
(√)

18- Spam is a program placed on a computer without the user (×)

19- Stealing the key used for encryption is called key intermediation (×)
20- The next major war will probably involve some kind of cyber-attacks (√)

21- The majority of computer crimes are committed by hackers and vandals with no ties to the
victim companies (×)

22- The most widely used data recovery technique is making regular backups (√)

23- Wireless access poses additional security risks (√)

24- When you browse from site to site, the cookie that has been loaded onto the computer’s hard drive
is not detected, read and matched with previous browsing activity (×)

You might also like