Which of the following is not a technology typically used by spyware?

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (173)

Students also viewed

Sets found in the same folder

Other sets by this creator

Verified questions

politics of the united states

Verified answer

finance

Federal Semiconductors issued 11% bonds, dated January 1, with a face amount of $800 million on January 1, 2016. The bonds sold for$739,814,813 and mature on December 31, 2035 (20 years). For bonds of similar risk and maturity the market yield was 12%. Interest is paid semiannually on June 30 and December 31. Required: 1. Prepare the journal entry to record their issuance by Federal on January 1, 2016. 2. Prepare the journal entry to record interest on June 30, 2016 (at the effective rate). 3. Prepare the journal entry to record interest on December 31, 2016 (at the effective rate). 4. At what amount will Federal report the bonds among its liabilities in the December 31, 2016, balance sheet?

Verified answer

politics of the united states

Verified answer

Recommended textbook solutions

Which of the following is not a technology typically used by spyware?

Which of the following is not a technology typically used by spyware?

Which of the following is not a technology typically used by spyware?

Which of the following is not a technology typically used by spyware?

資料庫原理與設計

11th EditionFred R. McFadden, Jeffrey A Hoffer, Mary B. Prescott

128 solutions

Other Quizlet sets

Upgrade to remove ads

Only A$47.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (44)

AAA

Authentication, Authorization, Accountability

CIA

Confidentiality, Integrity, Availability

availability

Security actions that ensure that data is accessible to authorized users.

block attacks

building security permiter

vulnerability

A flaw or weakness that allows a threat agent to bypass security.

integrity

insures information is correct and no alter

User Account Control

provides information to users and obtains their approval before a program can make a change to the computer's settings

patch

publicly released software security update intended to repair a vulnerability

viruses, Trojans, and worms

three types of malware that have the primary traits of circulation and/or infection

Rootkit

hide or remove all traces of evidence that may reveal the malware, such as log entries

Business Impact Analysis

incident response plan should be preceded by

The impact time frame of security awareness is

short term

Which of the following is a high level document that acts as an organizational law on cybersecurity?

policy

worm

computer through the network and then take advantage of a vulnerability in an application or an operating system on the host computer.

Which of the following is NOT a technology typically used by spyware?

disk driving software

Trojan

A program disguised as a harmless application that actually produces harmful results.

what are the three backup types

Full, Incremental, Differential

WWW

World Wide Web

HTML

- Allows Web authors to combine text, graphic
images, audio, video, and hyperlinks

Web Browser

- Displays the words, pictures, and other elements on
a user's screen

HTTP

Standards or protocols used by Web servers to
distribute HTML documents

Post Office Protocol (POP)

Responsible for incoming mail

Simple Mail Transfer Protocol (SMTP)

Handles outgoing mail

Extensions

Expand the normal capabilities of a web browser for
a specific webpage

Plug-in

- Adds new functionality to the browser so users can
play music, view videos, or display special graphic
images

Java

- Complete programming language
- Used to create small applications called applets

Add-Ons

Add a greater degree of functionality to the entire
browser; not just a single webpage as with a plug-in

First-party cookies

can be stolen and used to
impersonate user

Third-party cookies

used to track user's
browsing and buying habits

Cryptography

the art of protecting information by transforming it into an unreadable format, called cipher text

Steganography

the art and science of hiding information by embedding messages within other, seemingly harmless messages

Cleartext data

Data in an unencrypted form

Plaintext data

Cleartext data that is to be encrypted

Hash algorithms

Creates a unique "digital fingerprint" of a set of data

Symmetric Cryptographic Algorithms

Use the same single key to encrypt and decrypt

Digital Certificates

- Technology used to associate a user's identity to a
public key

What standarizes sounds and video format so plug-ins like Flash are no longer needed?

HTML5

Which type of web browser enhancement can change browser menus or create additional toolbars?

Add-ons

Which of the following uses graphical images of text in order to circumvent text-based filters?

Image spam

is also called a Flash cookie, named after Adobe Flash.

LSO

What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?

drive-by-download

Which of the following can be described as a poisoned ad attack?

malvertising

Proving that a document was created by a particular user is referred to as which of the following?

nonrepudiation

evil twin

fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam

Students also viewed

Chapter 5, 6

74 terms

amazinganabennett

Chapter 3, 4

59 terms

amazinganabennett

Cybersecurity

20 terms

ashia_itsmytime

Security Awareness Chapters 3 and 4

65 terms

crammychris

Sets found in the same folder

CIS133 - Chapter 3 Quiz

25 terms

thehumangerm

CIS133 - Chapter 1 Quiz

26 terms

thehumangerm

Computer Security

37 terms

lisapep

Security Awareness ch 1 quiz

23 terms

Olga365

Verified questions

physics

Using noble gas notation write the electron configuration for the chromium atom.

Verified answer

physics

Determine the transmission coefficient for a rectangular barrier $(V(x) = +V_0 > 0$ in the region –a<x<a). Treat separately the three cases $E<V_0, E=V_0,$ and $E>V_0$ (note that the wave function inside the barrier is different in the three cases).

Verified answer

chemistry

Hydrogen gas reacts with each of the halogen elements to form the hydrogen halides (HF, HCl, HBr, HI). Calculate the percent by mass of hydrogen in each of these compounds.

Verified answer

chemistry

An example of the positive deviation from Raoult's law is a solution made of acetone $\left(\mathrm{CH}_3 \mathrm{COCH}_3\right)$ and carbon disulfide $\left(\mathrm{CS}_2\right)$.\ Draw Lewis structures of these molecules. Explain the deviation from ideal behavior in terms of intermolecular forces.

Verified answer

Recommended textbook solutions

Which of the following is not a technology typically used by spyware?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Which of the following is not a technology typically used by spyware?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which of the following is not a technology typically used by spyware?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Which of the following is not a technology typically used by spyware?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Other Quizlet sets

ECON 2

35 terms

jack-yifei

Configuration and Setup Exam Weight 20%

102 terms

anthony_leonard89

bio 2000 ch 7

56 terms

yssa12345

Final Exam

28 terms

nferolito

Which is used to protect from spyware?

Here are a few tips that will help prevent spyware from creeping its way into your digital life: Use trusted antivirus software with anti-spyware and anti-malware features. Don't download suspicious-looking email attachments. Don't click on online pop-ups (or block them entirely with a secure browser)

Which of the following best describes spyware quizlet?

Which of the following best describes spyware? It monitors the actions you take on your machine and sends the information back to its originating source.

Which of the following best describes spyware Mcq?

Explanation. Spyware is the subset of Malware that gathers user data without the user's knowledge or consent.

What is spyware in computer quizlet?

Spyware. A type of Malware that locates and saves data from users without them knowing about it. Virus. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.