____ occurs when someone launches a frequent and unusually large number of information requests to a website.
Hijacking
Denial of service
Identity theft
Social engineering
Coding a message into a form unreadable to an interceptor is called ____.
authentication
prototyping
encryption
hijacking
Probably the easiest way to protect against loss of data is to automatically duplicate all data periodically, a process referred to as data ____.
RAID
signature
backup
copy
A ____ "represents" another server for all information requests from resources inside the trusted network.
router
firewall
DMZ
proxy server
A ____ is a way to authenticate online messages, analogous to a physical signature on a piece of paper, but implemented with public-key cryptography.
protocol
digital signature
message digest
digital certificate
____ are computer files that serve as the equivalent of ID cards by associating one's identity with one's public key.
Message digests
Proxy servers
Firewalls
Digital certificates
A(n ) ____ is a set of indivisible transactions that are either all executed or none are - never only some.
firewall
atomic transaction
hot site
biometric
To ensure against interruptions in power supply, organizations use ____ systems, which provide an alternative power supply for a short time, as soon as a power network fails.
DMZ
TLS
UPS
RAID
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
virus
honeytoken
worm
honeypot
A ____ is akin to the unique fingerprint of a file.
protocol
digital signature
message digest
digital certificate
An issuer of digital certificates is called a(n) ____.
certificate authority
signature authority
honeypot
encryption authority
The ____ is a network of computers that are connected to the company's trusted network (such as an intranet) at one end and the untrusted network - the public Internet - at the other end.
firewall
proxy server
DMZ
UPS
Once criminals have a person's identifying details, such as a National Insurance number, driver's licence number, or credit card number, they can pretend to be this person. This crime is called ____.
identity theft
social engineering
hijacking
denial of service
The best defence against unauthorized access to systems over the Internet is a ____, which is hardware and software that blocks access to computing resources.
digital certificate
firewall
hot site
RAID
A ____ is a server that contains a mirrored copy of a production database (a database that is used for business operations), or one with invalid records.
virus
honeytoken
worm
honeypot
A(n) ____ characteristic is a unique physical, measurable characteristic of a human being that is used to identify a person.
atomic
embedded
biometric
signature
____ a computer means using some or all of the resources of a computer linked to a public network without the consent of its owner.
Hijacking
Encrypting
Servicing
Prototyping
In ____, the voltage of the power decreases, or there are very short interruptions in the flow of power.
downtime
blackouts
social engineering
brownouts
____ is a set of disks that is programmed to replicate stored data to provide a higher degree of reliability.
RAID
SSO
HTTPS
TLS
One popular tracking tool is the ____: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval.