Level 31 Level 33
Level 32

451 - 465

15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Antivirus software
__________ is virus scan software, and uses several
__________ is a network of zombie compute that can be remotely controlled by a hacker working
Cyber warfare
__________ is a war in which a country's information
Digital certificate/csc certificate
A __________ is a type of electronic
Phishing scam
A __________ is an identity theft scam that arrives via e-mail
__________ is unwanted e-mail (usually of a commercial nature sent out in bulk)
Virus hoax
A __________ is a message usually email that claims about a virus that makes a claim
__________ is a single-celled or noncellular spherical or spiral or rod-shaped
A __________ is a software program capable of reproducing itself and usually capable of causing
A __________ is an idependent program that does not require another program in order to propogate.
Trojan Horse
A __________ is a program that appears desirable but actually contains something
Back door
A __________ is a undocumented "entry point" into a system.
__________ is written programs or procedures or rules and associated documentation pertaining to
__________ refers to the mechanical, magnetic, electronic, and electrical components making up
__________ is the process of transforming information into computer storage