Chapter 05 Part 01

1234567891011121314
Across
  1. 7. Is someone who uses the Internet or network to destroy or damage computers for political reasons?
  2. 10. what is a program or set of instructions in a program that allows users to bypass security controls?
  3. 11. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
  4. 13. What kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
  5. 14. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Down
  1. 1. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
  2. 2. How long can digital certificates be valid?
  3. 3. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
  4. 4. What type of individual may steal credit card numbers to make fraudulent purchases?
  5. 5. What is the term for a program that performs a repetitive task on a network?
  6. 6. Is someone who demands payment in order to stop an attack on an organization's
  7. 8. What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
  8. 9. What is the term for a website that uses encryption techniques to protect its data?
  9. 12. What term refers to making a copy of a file?