Card Set Information
The demand for IT professionals who know how to secure networks and computers is an an all time low.
The COMPTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in an IT administration, with focus on security.
Attack toolkits range in price from only $400 to as much as $8000.
Like a virus, a worm needs the user to perform an action such as starting a program os opening an email attachment to start the infection.
Roming a rootkit from an infected computer is extremely difficult.
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
A study by Foote Partners showed that security certifications earn employees ___ percent more pay than their uncertified counterparts
The position of ____ is generally an entry-level position for a person who has the necessary technical skills.
____ attacks are responsible for half of all malware delivered by Web advertising.
In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
____ ensures that only authorized parties can view information.
____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.
____ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
In information security, an example of a threat agent can be ____.
Both A and B
Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
What is another name for unsolicited e-mail messages?
The two types of malware that have the primary objective of spreading are ____.
Viruses and worms
A computer ____ is malicious computer code that reproduces itself on the same computer.
In a(n) ____ infection, a virus injects itself into the program’s executable code instead of at the end of the file.
Unlike other malware, a ____ is heavily dependent upon the user for its survival.
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
A ____ virus infects program executable files.
There are almost ____ different Microsoft Windows file extensions that could contain a virus.
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program
A ____ is a program advertised as performing one activity but actually does something else.
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
____ involves horizontally separating words, although it is still readable by the human eye.