Chapter 05 Part 04

1234567891011
Across
  1. 6. Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
  2. 7. What term is used to describe the process of restricting access to certain material on the web?
  3. 8. If you are nervous, a what might not match the one on file in a signature verification system.
  4. 10. Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
  5. 11. Which of the following terms is used to describe a small text file that a web server stores on your computer?
Down
  1. 1. what firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
  2. 2. To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major what software companies formed the BSA
  3. 3. A what can be a back door.
  4. 4. Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
  5. 5. Which of the following statements is not a safeguard against the failure of hardware?
  6. 9. Many organizations and businesses have strict written what governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly