Card Set Information
what protocol used to code telephone conversation into packets of compressed data
What server program allows users to collaborate to create the content of a web site
A ________ attempts to determine which e-mail addresses are valid on a network and then sends messages to all of those combinations
directory harvest attack
A ________ is a program that spreads by tricking users into granting permission to install it by pretending to be something else
Software programs that are designed with malicious intent are called ________.
Which of the following methods of responding to an e-mail message will automatically send the original attachments along with the response?
Which of the following would NOT be considered an advantage of e-mail as compared to regular postal mail?
Cost, Technical difficulties, remote access or speed
In order to make a Skype video call, both parties should have which of the following to make it work?
microphone, webcam, fast broadband Internet connection,all of the above
a lie intended to convince its audience it is real when it is not
crimeware used to capture personal information as it is entered into the computer
appropriate behavior on the Internet
A ________ is a program on an e-mail server that can send a message to be distributed to all addresses on the e-list.
structuring and sending e-mail
telephone conversations over the Internet
wireless access to the Internet
delivering e-mail (messages do not stay on the server)
delivering e-mail (messages stay on the server)
Which of the following would be an example of a disadvantage for using VoIP?
LACK OF MOBITILY
coding and decoding synchronous conversations
provides electric power for a short time
wireless service for sending audio and video
wireless service for sending brief messages
Which of the following is texting software for sending short messages on a wireless service?
SMTP is a protocol for ________.
The ________ is an emergency response site maintained by the SANS institute.
Internet Storm Center (ISC)
log of changes
program that allows users to collaborate to create the content of a Web site
program used to automatically identify and undo vandalism
program code before it is translated into machine code
Another name for an RSS reader is a(n) ________ and is used to display RSS files.
In order to ensure posts are from legitimate members, users might be asked to enter a ________.
The use of a live message center for text-based exchanges when users are active at the same time is called a ________.
On which line would the e-mail address of the primary recipient(s) be entered?
A rootkit might include a(n) ________ that allows the intruder to bypass normal system security to communicate with the system and take control.
The person on an e-list responsible for enforcing behavior rules is called a(n) ________
EXAMPLE: asynchronous = podcast
EXAMPLE:synchronous = chat
EXAMPLE: social networking= Facebook
EXAMPLE:professional networking = LinkedIn
EXAMPLE: open-source = Linux
tricks the user into granting permission to install it by pretending to be something else
steals information about a user to impersonate them in order to steal money
MONITORS A USERS BEHAVIOR AND REPORTS IT
causes the server to become overloaded and unable to provide timely service
PROGRAM THAT GIVES OUTSIDERS ACCESS TO A COMPUTER AND ADMINISTRATOR RIGHTS