Study

cybersecurity

  •   0%
  •  0     0     0

  • A software program that monitors your computer usage without your knowledge:
    spyware
  • A collection of remotely controlled bots that launch attacks are called:
    Bot Network
  • Victims of Cyberbullying often experience all but which of these ?
    financial strain
  • Measures taken to guard against spying or destructive actions is the meaning of ?
    Security
  • What is the generic term for a piece of malicious code?
    Malware
  • Which role of cyberbullying is described here: someone aware of cyberbullying but not intervening
    bystander
  • The use of electronic communication to harass, intimidate, or threaten a person or group of people is called ?
    Cyberbullying
  • Relating to computers or computer networks is the meaning of ?
    cyber
  • Which of these is not considered an impacted area due to cyber attacks?
    Mindset
  • Which of these is a secured site?
    https
  • A piece of malware that holds your computer hostage until something is done is called ?
    ransomeware
  • What should you do if you are being bullied?
    report the bully
  • Security experts that hack systems professionally (and legally) are known as:
    white hats
  • A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.
    Security patch
  • What does CIA stand for?
    confidentially integrity availability
  • A flaw in a computer program that makes it vulnerable is called a ___________?
    Security Hole
  • Coding and Computer Science are considered to be the New ?
    Literacy
  • Cyberbullying is especially harmful due to specific characteristics: Which of these is because it contributes to the digital footprint of the victim and the bully.
    Permanent
  • Which of these is not considered to be part of the Internet of Things:
    Canvas
  • A piece of code that copies itself is called a ____________________.
    Virus
  • Which role of cyberbullying is described here: someone aware of cyberbullying and trying to break the cycle
    upstander
  • What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
    Script-Kiddie
  • Using general knowledge of human behavior to trick users into breaking security rules is known as ?
    Social Engineering
  • What does PuP stand for?
    potentially unwanted programs
  • A programmer that breaks into someone else's computer system without permission is called a ?
    hacker
  • A standalone malware program that copies itself across computer networks is called a _____________?
    Worm
  • Cyberbullying is especially harmful due to specific characteristics: Which of these is because devices have constant communication with no respite for victims.
    Persistent
  • Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
    Discreet
  • What is the term for a "Citizen of Cyberspace".
    Netizen
  • The network of devices with the ability to connect and exchange data is known as ?
    The internet of things