Adaptive Learning Assignment: Chapter 1 - Computer Security
Virus symptoms
- The operating system does not launch properly - Critical files are deleted automatically
Which three of the following are ways to prevent computer virus infections?
- Web surfing should be limited to trusted sites. - Install the latest antivirus software and update frequently. - Downloaded content from the web should only be from trusted sites.
In Firefox, cookies can store a wide range if information including which of the following?
-Email address -Home address -Name
Which two of the following can help prevent a virus infection?
- Adjust your web browser's security settings to allow browsing only on trusted sites. - Never bypass your browser's built-in security features.
Ways to catch a computer virus
- Finding a thumb drive and then using it in your laptop - Downloading files from questionable Internet sites
Anti-virus programs
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?
Settings
Which two of the following statements are true regarding firewalls?
The Mac OS includes firewall protection.
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _____________ of service attack.
denial
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ________.
email virus
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a
hacker
A form of spyware/surveillance technology that records all typed actions is referred to as a ________.
keystroke logger
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called
ransomeware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
ransomeware
Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.
ransomware phishing keystroke logging Trojan
Often, to actually launch an attack on a computer, a virus must be opened and ___
run
Specialized hardware or software that capture packets transmitted over a network are called packet
sniffers
Software that illicitly collects information about your Internet surfing habits and behaviors is called
spyware
A program that appears legitimate but executes an unwanted activity when activated is commonly called a _______.
trojan
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Anti-malware apps
Help protect against malware: These apps help protect against a variety of malicious programs.
Firewalls
Help protect against worms and hackers: Firewall programs help protect against worms and hackers.
Ransomware
When activated, encrypts files on user hard drive and then sells a decryption program.
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____
hacker
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
A form of spyware that records all actions typed on a keyboard is called a _________ logger.
keystroke or key
Malware is short for _________ software.
malicious
Typically computer viruses must be _____ to attack and do damage to a digital device.
open and run
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
trojan horse
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ______.
zombie
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _________. An army of these are used to launch denial of service (DoS) attacks.
zombie
Which three of the following are well-known e-mail attacks?
- Phishing - Keystroke-logging Trojan - Ransomware
Select 3 ways in which computer virus commonly infect vulnerable digital devices.
- inserting and opening an infected thumb drive - opening an infected e-mail attachment - sharing an infected file
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
-Router -Server -Computer
Malware may be designed to do which three of the following?
-steal info - incapacitate a computer/network - destroy data
A program that appears legitimate, but executes an unwanted activity when activated is called a __________ horse virus.
trojan
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
Which of the following three statements are true regarding keystroke loggers?
- Can be hardware devices and software applications - Keystroke loggers can record passwords and confidential information - Software-based keystroke loggers can be installed by Trojans without the user's knowledge.
Which of the following three statements are true about Trojan malware?
- Often used to find passwords, destroy data, or to bypass firewalls. - Often found attached to free downloads and apps. - Similar to viruses, but do not replicate themselves.
Which three of the following statements are true about spyware?
- Installed via free downloads or by visiting certain illegitimate websites - Includes the collection of keystrokes, passwords, and confidential information - Collects information about your Internet surfing habits and behaviors.
Computer viruses can infect a digital device in which three of the following ways?
- Opening an infected e-mail attachment - Visiting a contaminated website - Downloading an infected file from the Internet
Which two of the following statements are true regarding firewalls?
- The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.
This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?
Button 4
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate.
Software that illicitly collects information about your Internet surfing habits and behaviors is called __
Spyware
Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called
adware
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
adware
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of
keystrokes account numbers passwords
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
private
Keystroke-logging Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator.
You can change your Firefox settings to allow you to do which three of the following?
- deny cookie storage requests - delete stored cookies automatically when you start Firefox - approve cookies storage requests.
Which of the following three are common types of malware?
- Viruses - Trojans - Worms
Software that infects computers and is created using computer code is called a computer _____.
virus