Tggg

Card Set Information

Author:
fkimery
ID:
215896
Filename:
Tggg
Updated:
2013-04-26 00:41:55
Tags:
Bghj
Folders:

Description:
fggh
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user fkimery on FreezingBlue Flashcards. What would you like to do?


  1. The demand for IT professionals who know how to secure networks and computers is an an all time low.
    False
  2. The COMPTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in an IT administration, with focus on security.
    True
  3. Attack toolkits range in price from only $400 to as much as $8000.
    False
  4. Like a virus, a worm needs the user to perform an action such as starting a program os opening an email attachment to start the infection.
    False
  5. Roming a rootkit from an infected computer is extremely difficult.
    True
  6. Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
    True
  7. A study by Foote Partners showed that security certifications earn employees ___ percent more pay than their uncertified counterparts
    10-14%
  8. The position of ____ is generally an entry-level position for a person who has the necessary technical skills.
    Security Tech
  9. ____ attacks are responsible for half of all malware delivered by Web advertising.
    Fake antivirus
  10. In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
    Distributed
  11. The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
    Information security
  12. ____ ensures that only authorized parties can view information.
    Confidentiality
  13. ____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.
    Integrity
  14. ____ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
    Authentication
  15. In information security, an example of a threat agent can be ____.
    Both A and B
  16. Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
    HIPPA
  17. The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
    Gramm-leach-bliley
  18. What is another name for unsolicited e-mail messages?
    Span
  19. The two types of malware that have the primary objective of spreading are ____.
    Viruses and worms
  20. A computer ____ is malicious computer code that reproduces itself on the same computer.
    Virus
  21. In a(n) ____ infection, a virus injects itself into the program’s executable code instead of at the end of the file.
    Swiss cheese
  22. Unlike other malware, a ____ is heavily dependent upon the user for its survival.
    Virus
  23. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
    Resident
  24. A ____ virus infects program executable files.
    Program
  25. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
    70
  26. A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program
    Companion
  27. A ____ is a program advertised as performing one activity but actually does something else.
    Trojan
  28. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event
    Logic bomb
  29. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
    Adware
  30. ____ involves horizontally separating words, although it is still readable by the human eye.
    Word splitting

What would you like to do?

Home > Flashcards > Print Preview