chapter 5 security

¡Supera tus tareas y exámenes ahora con Quizwiz!

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a

DDoS or DoS

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Which of the following are symptoms of an online nuisance attack?

Frequent pop-ups while searching the web or working in programs Pop-up start appearing after you visit unfamiliar sites. Receiving a lot of spam messages or bounced back e-mail messages

Cyberattacks include which three of the following?

Identity theft using a computer or network Distributed denial-of-service (DDOS) attacks Pharming

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

virus symptoms

The operating system does not launch properly Critical files are deleted automatically

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

advanced

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called

adware

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

An attack using a computer is a

cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called.

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n

email

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

false

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a

hacker

Hacking computer systems for politically or socially motivated purposes is called

hacktivism

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called

internet privacy

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a

keystroke logger

A virus written in a macro language and placed within a document or spreadsheet is called a

macro virus

Typically computer viruses must be

opened and run to attack and do damage to a digital device

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as

persistent cookies

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

pharming

To delete cookies in Safari, click

preferences

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called

ransomware

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it develope

retpoline a strategy to mitigate the meltdown and spectre vulnerabilities

A type of malware that is triggered each time you boot your computer is called a

rootkit

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n)

script kiddie

Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page

session

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

settings

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a

spam filter

Most e-mail applications, such as Gmail and Outlook, provide robust

spam filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

The main governmental organization that oversees Internet privacy in the United States is the Federal

trade commissions

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n)

trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a

trojan horse virus

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

true

One of the risks with cookies is

websites using cookies can collect your information and sell it to third parties

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called

white hat hackers

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

A virus written in a specific language and placed within a document or spreadsheet is called a

macro virus

The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called

phishing

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

A destructive program that replicates itself throughout a single computer or across a network is called a

worm

Select three true statements regarding persistent cookies.

Collect information about the Internet protocol (IP) Address. Collect information about user preferences. Collect password and username information

Ways to catch a computer virus

Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Meltdown Spectre

Digital identity

Online search activities Purchasing behavior Social media postings

Ways to catch a computer virus?

Opening suspicious or infected e-mail messages. Visiting questionable websites.

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

Which of the following are online nuisances?

Spam Spoofing Spyware

Select three privacy risks associated with cookies.

Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior.

Internet privacy

Who has access to data and information How data and information is used Techniques and technologies used to protect sensitive data and information

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

black hat hacker

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

You can change your Firefox settings to allow you to do which three of the following?

approve cookies storage requests. deny cookie storage requests. delete stored cookies automatically when you start Firefox.

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an

online nuisance

Software programs that hide in the operating system and allow for the installation of hidden files are called

rootkit

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

Unsolicited e-mail is

spam

Spam filters search for spam by watching for keywords and by monitoring suspicious

word pattern and frequencies

Which three of the following you should consider in the settings area of each browser?

Blocking or customizing your cookie settings Deleting cookies Decide from which sites you want to allow cookies

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. Contact the via the phone number listed on the US-CERT site.

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

Music Literary works Pictures

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Put the following steps of a virus infection in the correct order.

The virus arrives vie email attachment, file download, or by visiting an infected site An action such as running or opening the file triggers the virus The payload is activated and the virus starts its destructive actions

keystroke-logging trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed

denial of service attack (DoS)

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivist

International laws on_________ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

COPPA the Red Flags Rule

Put the following steps in the correct order for adjusting cookie settings.

Choose safari Click preferences Click privacy Change cookie settings

You need to adjust cookie and data permission settings in Google Chrome. Put the following steps in the correct order for adjusting cookie and site data permission settings in Google Chrome.

Click the Chrome menu on the browser toolbar then select settings Click show advances settings. In the privacy section, click the content settings button In the cookies section change the desired cookies settings

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

Processes Procedures Systems

first-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk:

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email

phishing ransomware keystroke logging Trojan

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a

spam filter

The European Union's (EU) European Commission data Protection Directive states that

under EU law, personal data can only be gathered legally under strict conditions.

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

A group of compromised computers controlled by a hacker is called a

botnet

A black hat hacker breaks into computer systems with the intent of

causing damage or stealing data

Which three of the following may be indications that your system has been hacked?

Redirected Internet searches Fake e-mails or social media messages in your account Unwanted browser toolbars

third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

blocking/allowing cookies by default. deleting cookies. making exceptions for cookies from specific websites or domains.

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a

zombie

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

Ways to avoid a computer virus

Adjust your web browser's security settings to allow browsing only on trusted sites. Surf the web and download content safely.


Conjuntos de estudio relacionados

SYG2000 Chapter 6. Social Control and Deviance InQuizitive

View Set

Chapter 16 Real Estate Appraisal

View Set

CH. 5 BOOK INFO: METHODS FOR ASSESSING AND SELECTING EMPLOYEES

View Set

marketing research quiz questions

View Set

Chapter 2,4 Assignment Questions

View Set

CompTIA Security+ Domain 1 Practice

View Set