2024 COMPLETE REAL EXAM QUESTIONS AND CORRECT
VERIFIED SOLUTIONS (A NEW UPDATED VERSION) |
GUARANTEED PASS A+ (BRAND NEW!!)
Digital security risk - ANSWER: any event or action that could cause loss of or
damage to computer or mobile device hardware, software, data, information, or
processing capability
Computer crime - ANSWER: any illegal act involving the use of a computer or related
devices generally
cybercrime - ANSWER: online or internet-based illegal acts
crimeware - ANSWER: software used by cybercriminals
hacker - ANSWER: someone who accesses a computer or network illegally
cracker - ANSWER: has the intent of destroying data, stealing information,or other
malicious action
script kiddie - ANSWER: has the same intent as a cracker but does not have the
technical skills and knowledge
cyberextortionist - ANSWER: someone who demands payment to stop an attack on
an organization's technology infrastructure
cyberterrorist - ANSWER: someone who uses the internet or network to destroy or
damage computers for political reasons
malware - ANSWER: programs that act without a users knowledge and deliberately
alter the operations of computers and mobile devices
virus - ANSWER: potentially damaging program that affects, or infects a computer or
mobile device negatively
worm - ANSWER: program that copies itself repeatedly
trojan horse - ANSWER: program that hides within or looks like a legitimate program
rootkit - ANSWER: program that hides within a computer and allows someone from a
remote location to take full control of the computer
spyware - ANSWER: program placed on a computer without the users knowledge
that secretly collects info about the user and then communicates info about the user
, adware - ANSWER: online advertisement in a banner or pop-up window on web ages
email messages, or other internet services
botnet - ANSWER: group of compromised computers or mobile devices connected to
a network such as the internet that are used to attack other networks
zombie - ANSWER: a compromised computer or device
bot - ANSWER: a program that performs a repetitive task
doS attack - ANSWER: an assault whose purpose is to disrupt computer access to an
internet service such as the web or email
back door - ANSWER: a program or set of instructions in a program that allows user
to bypass security control
spoofing - ANSWER: technique intruders use to make their network or internet
transmission appear legitimate to a victim computer
firewall - ANSWER: hardware or software that protects a networks resources from
intrusion by users on another network
personal firewall - ANSWER: software firewall that detects and protects a personal
computer and its data
unauthorized access - ANSWER: the use of a computer without permission
acceptable use policy - ANSWER: outlines the activities for which the computer may
or may not be used
access control - ANSWER: security measure that defines who can access a computer,
when they can access it, and what actions they can take when accessing it
password - ANSWER: private combo of characters associated with the user name
user name - ANSWER: unique combo of characters, such as letters or numbers that
identifies one user
CAPTCHA - ANSWER: displays an image containing a series of distorted characters for
a user to identify and enter in order to verify that user input is from humans
PIN - ANSWER: numeric password
biometric device - ANSWER: authenticates a persons identity by translating a
personal characteristic such as fingerprint into a digital code that is compared with a
digital code in a computer verifying a physical or behavioral characteristic