Digital Security Flashcards

1
Q

Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

A

B:encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

A

D:brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a characteristic of a weak password?

A

A:Eight characters in length and include one or more uppercase letters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

A

C:password manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If you use a password manager, what do you as the user need to remember?

A

B:The master password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

A

B:virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

A

A:heuristic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Once you have installed antivirus software, you don’t typically need to keep it running full time in the background

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

A

A:DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Correctly installed antivirus software will prevent all intrusions.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would be considered spyware?

A

A:a keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering attacks prey on human vulnerabilities.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam accounts for approximately ______ of all email.

A

D:70%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

A

B:Safe Browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly