
Chapter 10 Vocabulary CST IT Fundamentals
Presentation
•
Science
•
12th Grade
•
Medium
+3
Standards-aligned
Marina Brzostoski
Used 4+ times
FREE Resource
11 Slides • 15 Questions
1
malicious
and software
MAL=bad(Greek)
Some text here about the topic of discussion.
Malware is a blend of
2
Malware is software designed to infiltrate or damage a computer system without the owner's consent or knowledge.
Some text here about the topic of discussion
3
Poll
Malware is software designed to_______ a computer system
invade
creep into
improve
4
Multiple Choice
Malware
A scheme for classifying information based on different levels of public/private distinctions.
Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.
5
Some text here about the topic of discussion.
Crypt=hidden ( Greek)
6
Fill in the Blanks
Type answer...
7
Multiple Select
Encryption means:
To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.
en=in
crypt=secret
ion=noun suffix
to put into code
Data Center
8
Match
Encrypt
decrypt
cryptocurrency
cryptography
crypto-
To put into code
decode- to convert from code into plaintext.
alternative form of payment created using encryption algorithms
Secret writing
secret
To put into code
decode- to convert from code into plaintext.
alternative form of payment created using encryption algorithms
Secret writing
secret
9
Authentication (from Greek: αὐθεντικός authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user.
Some text here about the topic of discussion.
AUTHENTICATION
10
Multiple Choice
Authentication that requires two or more evidences of authentication, usually of different types.
Authorization
Multi-Factor Authentication
Logging
Disaster Recovery
11
that the services it provides are no longer available to legitimate network clients.
legitimate( by law)
An attack that attempts to overload a system so
overload ( over=too much)
Denial of Service
Some text here about the topic of discussion
12
Fill in the Blanks
Type answer...
13
The capturing and storing of computer and user events.
storing ( keeping track of)
Logging
Some text here about the topic of discussion
14
Fill in the Blanks
Type answer...
15
Public/Private Classification
Distinctions=differneces
A scheme for classifying information based on different levels of public/private distinctions.
Some text here about the topic of discussion
16
Multiple Choice
A scheme for classifying information based on different levels of public/private distinctions.
Malware
Data Encryption
Public/Private Classification
Disaster Recovery
17
Business Continuity
Continue- ongoing
The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
Some text here about the topic of discussion
18
Multiple Choice
Business Continuity
ongoing prevention and recovery
encoding data
a copy of a file
the process of creating systems
19
Disaster Recovery
induced- made
An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
Some text here about the topic of discussion
20
Fill in the Blanks
Type answer...
21
Backup File
Corrupted-wronged
A copy of a file that can be used when the original file has been lost or corrupted.
Some text here about the topic of discussion
22
Open Ended
A copy of a file that can be used when the original file has been ____ __ _________.
23
An area used to store and share such things as computer systems, applications, data, and other components such as switches and routers. .
Some text here about the topic of discussion.
Data Center
24
Open Ended
Data Center is an area used to store and share .......
25
Match
An attack when services are no longer available to legitimate network clients.
Software to infiltrate or damage a computer system without the owner's knowledge.
The capturing and storing of computer and user events.
Authentication that requires two or more evidences of authentication, usually of different types.
The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.
denial of service
Malware
logging
Multi-Factor Authentication
Data Encryption
denial of service
Malware
logging
Multi-Factor Authentication
Data Encryption
26
Match
A scheme for classifying information based on different levels of public/private distinctions.
An area used to store and share such things as computer systems, applications, data, and other components such as switches and routers.
A copy of a file which can be used when the original file has been lost or corrupted.
An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
Public/Private Classification
Data Center
Backup File
Disaster Recovery
Business Continuity
Public/Private Classification
Data Center
Backup File
Disaster Recovery
Business Continuity
malicious
and software
MAL=bad(Greek)
Some text here about the topic of discussion.
Malware is a blend of
Show answer
Auto Play
Slide 1 / 26
SLIDE
Similar Resources on Wayground
20 questions
Tragedy
Presentation
•
12th Grade
21 questions
ANS 1 - Obj. 1.02 Public Speaking
Presentation
•
12th Grade
19 questions
Body Mass Index (BMI)
Presentation
•
12th Grade
20 questions
Nutrition in Plants
Presentation
•
12th Grade
22 questions
Nutrition and Metabolism
Presentation
•
12th Grade
17 questions
Geologic Time Data Collection
Presentation
•
11th - 12th Grade
20 questions
Skeletal System
Presentation
•
12th Grade
22 questions
Nuclear Power
Presentation
•
11th - 12th Grade
Popular Resources on Wayground
19 questions
Naming Polygons
Quiz
•
3rd Grade
10 questions
Prime Factorization
Quiz
•
6th Grade
20 questions
Math Review
Quiz
•
3rd Grade
15 questions
Fast food
Quiz
•
7th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
Discover more resources for Science
100 questions
Biology EOC Review
Quiz
•
9th - 12th Grade
25 questions
Biology EOC review Quiz
Quiz
•
9th - 12th Grade
21 questions
Biology EOC Review (ecology)
Quiz
•
9th - 12th Grade
30 questions
Environmental Science Final Exam REVIEW
Quiz
•
9th - 12th Grade
49 questions
AP Environmental Science Final Exam Review
Quiz
•
10th Grade - University
16 questions
Taxonomy and Classification
Quiz
•
6th - 12th Grade
50 questions
Biology EOC Review
Quiz
•
9th - 12th Grade
28 questions
Greenhouse effect
Quiz
•
9th - 12th Grade