Term
| A _____ virus attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code. |
|
Definition
|
|
Term
| Most _____ virus programs are boot sector viruses that use various methods to hide from antivirus software. |
|
Definition
|
|
Term
| _____ is the act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically. |
|
Definition
|
|
Term
| Once you've gathered data about a particular system or you've dealt with a computer or network problem, you need to complete the missions by telling your supervisor. This is called _____. |
|
Definition
|
|
Term
| _____ is Microsoft's variation of the CHAP protocol using a slightly more advanced encryption protocol. |
|
Definition
|
|
Term
| A _____ is a complete program that travels from machine to machine, usually through computer networks. |
|
Definition
|
|
Term
| _____ are those surprise browser windows that appear automatically when you visit a Web site, they're basically just annoying. |
|
Definition
|
|
Term
| _____ programs use different techniques to combat different types of viruses. |
|
Definition
|
|
Term
| Security starts with properly implemented _____, which means in essence how the computer determines who can or should access it. |
|
Definition
|
|
Term
| A _____ is an addition to the operating system to patch a hole in the OS code. |
|
Definition
|
|
Term
| _____ is composed of four interlinked areas that a good security-minded tech should think about: physical security, authentication, users and groups, and security policies. |
|
Definition
|
|
Term
| Programs that intrude unwanted into your computing experience but don’t do any damage to your system or data are called _____. |
|
Definition
|
|
Term
| A computer _____ is a piece of malicious software that gets passed from a computer to computer. |
|
Definition
|
|
Term
| _____ simply means that you fix things the virus harmed. |
|
Definition
|
|
Term
| _____ provides transparent encryption methods between the server and the client. |
|
Definition
|
|
Term
| _____ are true, freestanding programs that do something other than what the person who runs the program thinks they will do. |
|
Definition
|
|
Term
| The _____ Edits policy makes it so that if you try to edit the Registry, you get failure message. |
|
Definition
|
|
Term
| _____ is the generic term for anytime a hacker goes through your refuse, looking for information. |
|
Definition
|
|
Term
| Make sure you and your users use _____ passwords: at least 8 characters long, including letters, numbers, and punctuation symbols. |
|
Definition
|
|
Term
| _____ is the most common remote access protocol, by which the serving system challenges the remote client by asking the remote client some secret, usually a password. |
|
Definition
|
|
Term
| _____ defines a family of programs the run in the background on your PC, sending information about your browsing habits to the company that installed it on your system. |
|
Definition
|
|
Term
| In all network operating systems, the permissions of the groups are combined, and the result is what you call the _____ permissions the user has to access the resource. |
|
Definition
|
|
Term
| _____ are devices or software that protect and internal network from unauthorized access to and from the internet at large. |
|
Definition
|
|
Term
| The process of using or manipulating people inside the networking environment to gain access to that network from the outside is called. |
|
Definition
|
|
Term
| _____ is the oldest and most basic form of authentication. |
|
Definition
|
|
Term
| _____ access occurs when a person accesses resources without permission. |
|
Definition
|
|
Term
| By using _____ you can exercise deity-like control over your network clients. |
|
Definition
|
|
Term
| _____ in the security sense means to tell Windows to create an entry in the Security Log when certain events happen. |
|
Definition
|
|
Term
| _____ is a common form of infiltration. |
|
Definition
|
|
Term
| Devices that require some sort of physical, flesh and blood authentication are called _____ devices. |
|
Definition
|
|
Term
| _____ means that members of an organization or company must abide by or comply with all of the rules that apply to the organization or company. |
|
Definition
|
|
Term
| _____ are probably the most common social engineering attack. |
|
Definition
|
|
Term
| The _____ Length policy forces a minimum password length. |
|
Definition
|
|
Term
| The _____ policy defines how you may along on the system locally. |
|
Definition
|
|
Term
| The list of virus signatures your antivirus programs can recognize is called the _____ file. |
|
Definition
|
|
Term
| The most famous of all application encryptions is Netscape's _____ security protocol, which is used to create secure Web sites. |
|
Definition
|
|
Term
| _____ works like spyware to display ads on your system. |
|
Definition
|
|