• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/6

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

6 Cards in this Set

  • Front
  • Back
A ________ is someone who demands payment to stop an attack on an organization's technology infrastructure.
cyberextortionist
________ is a type of malware that is placed on a computer without the user's knowledge that secretly collects information about the user.
Spyware
A(n) ________ encryption algorithm inserts characters between existing characters.
expansion
A(n) ________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text.
public key
A(n) ________ backup method is the only real-time back up, providing very fast recovery of data.
continuous data protection
Online shopping websites generally use a ________ to keep track of items in a user's shopping cart.
session cookie