CIS ---Computer Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) ____

Trojan

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

proxy

Safari accepts cookies and website data from which of the following?

Only from websites you visit

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___________

haktivisim

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___

ransomware

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

--One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance --Most fee-based software comes with technical support

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

--Packet filters --Proxy servers

Persistent cookies store information about which two of the following?

--User preferences --Password and username information

Select three privacy risks associated with cookies.

--Websites can track your surfing behavior and create a profile. --Websites using cookies can collect your information and sell it to third parties. --Corporate and government entities can track your web behavior.

Click and drag on elements in order Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.

1. Choose Safari 2. Click Preferences 3. Click Privacy 4. Change cookie settings

Put the following steps in the correct order to set parental controls in Mac OS X

1. Select system preferences, then click Parental controls 2. Click the lock icon to unlock it, then enter an administrator name and password 3. Select a user, then click Enabled Parental Control 4. If the user is not in the list, click Add, then fill in the name, account, and password information to create a new user

Which three of the following may be indications that your system has been hacked?

-Unwanted browser toolbars -Redirected Internet searches -Fake e-mails or social media messages in your account

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____

quarantine

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

script kiddie

When a computer is used to commit a crime it is considered a ___.

cybercrime

Which two of the following are ways to safely download antivirus software?

-Download the software from a trusted site like www.cnet.com -Download the software from a known antivirus software vendor

You can change your Firefox settings to allow you to do which three of the following?

-approve cookies storage requests -delete stored cookies automatically when you start Firefox -deny cookie storage requests

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

-deleting cookies. -making exceptions for cookies from specific websites or domains. -blocking/allowing cookies by default.

Most e-mail applications, such as Gmail and Outlook, provide robust ______________ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

A type of malware that replicates itself throughout a single computer or across a network is called a ___________

worm

Which three of the following are factors to consider to help protect the hardware of your digital device?

-Protecting a digital device from magnetic fields -Protecting a digital device from humidity -Protecting a digital device from overheating

Which three of the following statements are true regarding passwords and passcodes?

-The terms passcode and key are synonymous for password -Passwords can be used to secure computers, networks, software, personal accounts, and digital devices -Keys are often generated by encryption software or by the vendor who produced the software

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network __________Translation provides a type of firewall protection by hiding internal IP addresses.

Address

The technology that provides a type of firewall protection by hiding internal IP addresses is called

NAT (Network Address Translation)

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Router Computer

Wyatt needs a password for his school's e-mail system. Which password is the most secure?

Xj9%ft7

Experts suggest using password ___________ software to keep your passwords safe.

management

A typical ___ manager (such as Dashlane or LastPass) is installed as a browser plug in and provides for extremely secure logins.

password

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____.

password

A group of compromised computers controlled by a hacker is called a _____

botnet

If you believe you have fallen victim to a phishing scam you should:

contact the institution the message was allegedly sent from contact US-CERT

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

keystroke logger

A virus written in a specific language and placed within a document or spreadsheet is called a _______________ virus.

macro

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

A type of malware that is triggered each time you boot your computer is called a ____________

rootkit

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

To delete cookies in Safari, click

Preferences

In Facebook, where would you click to download a copy of your Facebook data?

Settings

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?

Sxf6512@fg%

Which two of the following are true about script kiddies?

--Amateur computer hackers with little programming expertise. --Illegally gain access to computer systems using programs (scripts) that others have written.

Which three of the following you should consider in the settings area of each browser?

1. Decide from which sites you want to allow cookies 2. Deleting cookies 3. Blocking or customizing your cookie settings

Which of the following organization you should contact if you receive a phishing message?

US-CERT

It is important to think before you click when you _____________ software from the Web

downloading

A form of spyware that records all actions typed on a keyboard is called a ____________ logger.

keystroke

A virus that is written in a macro language and placed within a file such as a document or a spreadsheet is called a ___ virus.

macro

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Adware often accompanies downloaded ____

programs

Stored in temporary memory, _____________ cookies are used to analyze and measure traffic on a web page.

session

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

settings

The software code of a particular computer virus is called the virus

signature

Most e-mail applications, such as Gmail and Outlook, provide robust ____________________ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a __ filter.

spam

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber ___________

terrorist

Cyberattacks include which three of the following?

1. Pharming 2. Distributed denial-of-service (DDOS) attacks 3. Identity theft using a computer or network

A ________ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

Black

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Which of the following three statements are true regarding macro viruses?

Commands in the macro language set off the destructive events. When file is opened the macro virus executes. Initiated by downloading and opening an infected attachment.

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome. Multiple choice question. True

False

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Strange error messages or pop-up ads Files get deleted or encrypted

Which three of the following are considered cybercrimes?

-Cyberbullying -Data theft -Intentional data corruption

Which three of the following statements are true about spyware?

Installed via free downloads or by visiting certain illegitimate websites. Includes the collection of keystrokes, passwords, and confidential information Collects information about your Internet surfing habits and behaviors.

Which of the following two statements best describe phishing?

Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

Which of the following are online nuisances?

Spam Spyware Spoofing

A program that appears legitimate, but executes an unwanted activity when activated is called a _____________horse virus.

Trojan

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _______________

pharming

The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called _________________

phishing

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

Software that illicitly collects information about your Internet surfing habits and behaviors is called _______________

spyware

Software that infects computers and is created using computer code is called a computer _______________

virus

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called ____________hat hackers.

white

It is important to think before you click when you ______________software from the Web.

downloading

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___

e-mail virus

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ________________

email

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at _____________ , a company better known for its search engine and its Pixel series smartphones.

google

Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device

hardware

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___

ransomware

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

ransomware keystroke logging Trojan phishing

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Put the following steps in the correct order for navigating to the Windows firewall area.

1. Click the Start button 2. Click the Settings icon 3. Click Update & Security 4. Click Windows Security

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack

DDoS or DoS

Malware is short for ______________ software

malicious

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

passwords keystrokes account numbers

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a ________________ filter.

spam

Malware is short for ____________ software.

malicious

Which of the following are widely used tactics that can keep you safe on the Web?

Consider using a VPN Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS. Use your browser's private browsing mode.

Malware may be designed to do which three of the following?

Destroy data Steal information Incapacitate a computer or network

Categorize the items as ways to avoid or catch a computer virus (two in each category). Instructions

Ways to avoid a computer virus Adjust your web browser's security settings to allow browsing only on trusted sites. Surf the web and download content safely. Ways to catch a computer virus Opening suspicious or infected e-mail messages. Visiting questionable websites.

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

heuristic-based detection signature-based detection

Which two of the following statements are true regarding firewalls?

--The Mac OS includes firewall protection. --Having more than one firewall app on your computer may cause conflicts and other problems.

Put the following steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site 2. An action such as running or opening the file triggers the virus 3. The payload is activated and the virus starts its destructive actions.

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

Which of the following is true about worms?

Automatically reproduces itself

The software code of a particular computer virus is called the virus ___________

signature

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Button 4

An attack using a computer is a ___________

Cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called ___________________

Cybercrime

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _____________ of service attack.

Denial

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Which of the following three statements are true regarding keystroke loggers?

Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications. Software-based keystroke loggers can be installed by Trojans without the user's knowledge.

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

Categorize the following as either virus symptoms or ways to catch a computer virus (two in each category).Categorize the following as either virus symptoms or ways to catch a computer virus (two in each category).

Virus symptoms The operating system does not launch properly Critical files are deleted automatically Ways to catch a computer virus Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

Often, to actually launch an attack on a computer, a virus must be opened and ___

run

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called _______________

ransomware

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

Heuristic and signature-based detection are two techniques used by ___ software.

antivirus

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____

antivirus software

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Rootkits are typically used to allow hackers to do which three of the following?

1. Install rogue files 2. Encrypt files 3. Create backdoors

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

Computer viruses can infect a digital device in which three of the following ways?

Visiting a contaminated website Downloading an infected file from the Internet Opening an infected e-mail attachment

Which of the following three are common types of malware?

Worms Trojans Viruses

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___

Zombie

This is the Control Panel in Windows. Which number would you click to adjust your firewall settings

1

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

-In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. -Contact the via the phone number listed on the US-CERT site.

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

Email

Which of the following three statements are true about Trojan malware?

Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves.

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Match the following terms to their correct definition.

Phishing----- ----Tricks users into revealing usernames and passwords by appearing legitimate. Ransomware ----When activated, encrypts files on user hard drive and then sells a decryption program. Keystroke-logging Trojan ---When activated, saves all keystrokes for subsequent transmission to virus creator.

Which of the following are symptoms of an online nuisance attack?

Pop-up start appearing after you visit unfamiliar sites. Receiving a lot of spam messages or bounced back e-mail messages. Frequent pop-ups while searching the web or working in programs

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Spectre Meltdown

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an __________________ nuisance.

online

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

opening an infected e-mail attachment inserting and opening an infected thumb drive sharing an infected file

One of the risks with cookies is ___________

websites using cookies can collect your information and sell it to third parties

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

Match the following terms to their proper description.

Firewalls----- Help protect against worms and hackers: Firewall programs help protect against worms and hackers. Anti-virus programs ---Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats. Anti-malware apps ---Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

Match the following terms about web cookies to their proper description. Instructions

---Web cookie matches------ Small text file of information created by websites you visit that your web browser stores on your hard disk: -----First-party cookie---- Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session ----Third-party cookie --Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

You need to adjust cookie and data permission settings in Google Chrome. Put the following steps in the correct order for adjusting cookie and site data permission settings in Google Chrome.

1. Click the chrome menu on the browser toolbar then select settings 2. Click show advanced settings. In the "Privacy" section, click the Content settings button 3. In the "cookies" section change the desired cookies settings

Put the following steps in the correct order for turning on Parental Controls in Microsoft Windows

1. Open Parental Controls 2. Click the standard user account that you want to set Parental Controls for 3. Under Parental Controls click "On" then enforce current settings 4. Adjust time limits, access to specific programs, access to specific websites

Put the following steps in the correct order for setting restrictions in Mac OS X.

1. Select Sytem Preferences, then click Parental Control 2. Click the lock icon to unlock it, then enter an administrator name and password 3. Select a user, then click one of the tabs along the top.

Which three of the following settings can you restrict in the Mac OS?

1. Which apps the user can access 2. Restrict user's access to other people through Game Center, Mail, and Messages 3. Limit access to specific websites

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Which three of the following are well-known e-mail attacks?

Phishing Keystroke-logging Trojan Ransomware

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattact

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

Harming or harassing via information technology and networks in a repeated and deliberate manner is called _________

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

Which component of a network designed to prevent unauthorized Internet intrusions?

firewall

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

A virus written in a macro language and placed within a document or spreadsheet is called a _____

macro virus

Specialized hardware or software that capture packets transmitted over a network are called packet _________

sniffer

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ______. An army of these are used to launch denial of service (DoS) attacks.

zombie

Which area of the Control Panel screen in Windows allows you to adjust Parental Controls?

3


Conjuntos de estudio relacionados

OCE Exam 1 (NOT INCLUDING GRAPHICS)

View Set

RN Maternal Newborn Online Practice 2023 A

View Set

Spanish III conditional/future oral

View Set