Questions and CORRECT Answers
Anti-malware software - CORRECT ANSWER - Software designed to stop malware from
damaging a computer or network
Authentication - CORRECT ANSWER - A method for confirming users' identities
Biometrics - CORRECT ANSWER - the identification of a user based on a physical
characteristic, such as a fingerprint, iris, face, voice, or handwriting
Checksums(Tools for integrity) - CORRECT ANSWER - The computation of a function
that maps the contents of a file to a numerical value. Depends on the entire content of a full and
is designed in a way that even a small change to the input file is highly likely to result in a
different output value
Cyber Hygiene - CORRECT ANSWER - the steps that computer users can take to
improve their cybersecurity and better protect themselves online
Cyberbullying - CORRECT ANSWER - the use of electronic communication to bully a
person, typically by sending messages of an intimidating or threatening nature.
Cybersecurity - CORRECT ANSWER - the state of being protected against the criminal or
unauthorized use of electronic data, or the measures taken to achieve this.
hacker - CORRECT ANSWER - a person who uses computers to gain unauthorized access
to data.
Malware - CORRECT ANSWER - software designed to infiltrate or damage a computer
system without the user's informed consent
, Operating System (OS) - CORRECT ANSWER - The system software that controls the
way in which a computer system functions, including the management of hardware, peripherals,
and software.
Phishing - CORRECT ANSWER - An attack that sends an email or displays a Web
announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user
into surrendering private information
Ransomware - CORRECT ANSWER - a type of malicious software designed to block
access to a computer system until a sum of money is paid.
Router - CORRECT ANSWER - (computer science) a device that forwards data packets
between two or more different computer networks
Social Engineering - CORRECT ANSWER - hackers use their social skills to trick people
into revealing access credentials or other valuable information
spear phishing - CORRECT ANSWER - a phishing expedition in which the emails are
carefully designed to target a particular person or organization
Trojan Horse - CORRECT ANSWER - a program designed to breach the security of a
computer system while ostensibly performing some innocuous function.
Virtual Machine - CORRECT ANSWER - One or more logical machines created within
one physical machine.
VMware - CORRECT ANSWER - ____ is the most widely implemented virtualization
software today.
Windows Defender - CORRECT ANSWER - A free antispyware program provided by
Microsoft.