Term
A _____ virus attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code. |
|
Definition
|
|
Term
Most _____ virus programs are boot sector viruses that use various methods to hide from antivirus software. |
|
Definition
|
|
Term
_____ is the act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically. |
|
Definition
|
|
Term
Once you've gathered data about a particular system or you've dealt with a computer or network problem, you need to complete the missions by telling your supervisor. This is called _____. |
|
Definition
|
|
Term
_____ is Microsoft's variation of the CHAP protocol using a slightly more advanced encryption protocol. |
|
Definition
|
|
Term
A _____ is a complete program that travels from machine to machine, usually through computer networks. |
|
Definition
|
|
Term
_____ are those surprise browser windows that appear automatically when you visit a Web site, they're basically just annoying. |
|
Definition
|
|
Term
_____ programs use different techniques to combat different types of viruses. |
|
Definition
|
|
Term
Security starts with properly implemented _____, which means in essence how the computer determines who can or should access it. |
|
Definition
|
|
Term
A _____ is an addition to the operating system to patch a hole in the OS code. |
|
Definition
|
|
Term
_____ is composed of four interlinked areas that a good security-minded tech should think about: physical security, authentication, users and groups, and security policies. |
|
Definition
|
|
Term
Programs that intrude unwanted into your computing experience but don’t do any damage to your system or data are called _____. |
|
Definition
|
|
Term
A computer _____ is a piece of malicious software that gets passed from a computer to computer. |
|
Definition
|
|
Term
_____ simply means that you fix things the virus harmed. |
|
Definition
|
|
Term
_____ provides transparent encryption methods between the server and the client. |
|
Definition
|
|
Term
_____ are true, freestanding programs that do something other than what the person who runs the program thinks they will do. |
|
Definition
|
|
Term
The _____ Edits policy makes it so that if you try to edit the Registry, you get failure message. |
|
Definition
|
|
Term
_____ is the generic term for anytime a hacker goes through your refuse, looking for information. |
|
Definition
|
|
Term
Make sure you and your users use _____ passwords: at least 8 characters long, including letters, numbers, and punctuation symbols. |
|
Definition
|
|
Term
_____ is the most common remote access protocol, by which the serving system challenges the remote client by asking the remote client some secret, usually a password. |
|
Definition
|
|
Term
_____ defines a family of programs the run in the background on your PC, sending information about your browsing habits to the company that installed it on your system. |
|
Definition
|
|
Term
In all network operating systems, the permissions of the groups are combined, and the result is what you call the _____ permissions the user has to access the resource. |
|
Definition
|
|
Term
_____ are devices or software that protect and internal network from unauthorized access to and from the internet at large. |
|
Definition
|
|
Term
The process of using or manipulating people inside the networking environment to gain access to that network from the outside is called. |
|
Definition
|
|
Term
_____ is the oldest and most basic form of authentication. |
|
Definition
|
|
Term
_____ access occurs when a person accesses resources without permission. |
|
Definition
|
|
Term
By using _____ you can exercise deity-like control over your network clients. |
|
Definition
|
|
Term
_____ in the security sense means to tell Windows to create an entry in the Security Log when certain events happen. |
|
Definition
|
|
Term
_____ is a common form of infiltration. |
|
Definition
|
|
Term
Devices that require some sort of physical, flesh and blood authentication are called _____ devices. |
|
Definition
|
|
Term
_____ means that members of an organization or company must abide by or comply with all of the rules that apply to the organization or company. |
|
Definition
|
|
Term
_____ are probably the most common social engineering attack. |
|
Definition
|
|
Term
The _____ Length policy forces a minimum password length. |
|
Definition
|
|
Term
The _____ policy defines how you may along on the system locally. |
|
Definition
|
|
Term
The list of virus signatures your antivirus programs can recognize is called the _____ file. |
|
Definition
|
|
Term
The most famous of all application encryptions is Netscape's _____ security protocol, which is used to create secure Web sites. |
|
Definition
|
|
Term
_____ works like spyware to display ads on your system. |
|
Definition
|
|