Front | Back |
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.
|
Security vulnerability
|
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
|
Authentication
|
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
|
Brute force
|
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user’s password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file
|
Dictionary
|
The ____ is a popular protocol used to manage networked equipment.
|
SNMP
|
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.
|
PnP
|
____ is a service that allows devices on a network to discover other devices and determine how to work with them.
|
UPnP
|
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
|
Virus
|
A ____ is a computer program that lies dormant until it is triggered by a specific event.
|
Logic bomb
|
____ is a general term used to describe software that violates a user’s personal security.
|
Spyware
|
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
|
Identity theft
|
One of the spyware tools often used is ____.
|
Spam
|
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
|
Spam
|
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.
|
Rogue access point
|
A ____ attack is designed to prevent a device from performing its intended function.
|
Denial-of-service (DoS)
|