Professional Documents
Culture Documents
2. Hardware or software that blocks unwanted 4. This type of attack overwhelms a network
access to a network is a(n) _____________. server with the intent of slowing or shutting
a. War driver down the server.
b. Firewall a. Denial of service
c. Encrypter b. Bot attack
d. White hat c. Piggybacking
d. War driving
2. This type of virus is hidden from the owner 4. A phony button, graphic, or link on a website
and allows the computer to be controlled is used for ______________.
remotely. a. Phishing
a. Rootkit virus b. Pharming
b. Worm virus c. Spoofing
c. Macro virus d. Clickjacking
d. Logic bomb virus
2. This type of spyware records everything you 4. Viruses designed for a notebook, tablet, or
type. smartphone are referred to by this term.
a. Adware a. Mobile malware
b. Spam b. Mobile mania
c. Cookie c. Mobile risk
d. Keylogger d. Mobile software
Chapter Summary
After successfully completing this chapter, you are now able to:
Explain various types of network risks that occur when computers are
connected to a network or the Internet
Describe techniques used to protect against network and Internet intrusions
Distinguish various types of malware and methods to prevent malware
Recognize privacy concerns when using the Internet and strategies for
safeguarding personal information
Identify mobile device security risks and techniques for minimizing risk