Computer Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.

DDoS

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ________. An army of these are used to launch denial of service (DoS) attacks.

zombie

Cookies stored on a computer store information about ________.

user preferences

The acronym DDoS stands for ________.

Distributed Denial of Service

Ways to catch a computer virus

Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

Anti-malware apps

Help protect against malware: These apps help protect against a variety of malicious programs.

Anti-virus programs

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _______________ of service attack.

denial

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

email virus

A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.

firewall

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called

ransomware

Put the following steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. The payload is activated and the virus starts its destructive actions.

The malevolent use of computer code to change a computer or network's normal operations is called a ________.

cyberattack

You can change your Firefox settings to allow you to do which three of the following?

delete stored cookies automatically when you start Firefox. deny cookie storage requests. approve cookies storage requests.

Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a ________.

trojan horse

Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________.

white hat hackers

Which of the following three are common types of malware?

Worms Trojans Viruses

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.

spoofing

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Computer viruses can infect a digital device in which three of the following ways?

Downloading an infected file from the Internet Opening an infected e-mail attachment Visiting a contaminated website

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

Email

Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Which three of the following statements are true about spyware?

Includes the collection of keystrokes, passwords, and confidential information Installed via free downloads or by visiting certain illegitimate websites. Collects information about your Internet surfing habits and behaviors.

Firewall software used to block Internet-specific content of a user is called an ________ filter.

Internet

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Which three of the following are well-known e-mail attacks?

Keystroke-logging Trojan Ransomware Phishing

In Firefox, cookies can store a wide range if information including which of the following?

Name Home address Email address

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Private

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Computer Server

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

Which of the following three statements are true about Trojan malware?

Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls.

Which of the following three statements are true regarding keystroke loggers?

Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications.

Malware may be designed to do which three of the following?

Steal information Incapacitate a computer or network Destroy data

The use of cookies allows you to do which of the following?

Store site preferences Remain signed into websites Surfacing of local (geotargeted) content

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

virus symptoms

The operating system does not launch properly Critical files are deleted automatically

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Three lines

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

A program that appears legitimate but executes an unwanted activity when activated is commonly called a __.

Trojan

Select two true statements about packet sniffers.

Unauthorized sniffers are used to steal information. Legitimate sniffers are used for routine examination and problem detection.

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.

Zombie

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

A virus signature is the software ________ of a particular computer virus.

code

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullying

Trojan horse programs are used to find all of the following except

finding free downloads

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _______

hacker

A zombie is a computer controlled by a ________.

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A form of spyware that records all actions typed on a keyboard is called a ______ logger.

key

A ________ logger is a form of spyware that records your keyboard strokes.

keystroke

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

keystroke logger

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

keystroke logging Trojan ransomware phishing

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

keystrokes passwords account numbers

What type of virus is written in a macro language and placed in a document or table?

macro virus

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.

Malware is short for ______ software.

malicious

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

Adware often accompanies downloaded _____.

programs

If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________.

quarantine

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .

ransomware

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

One of the main differences between free and fee-based antivirus software is ________.

the number of features

A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse virus.

trojan

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

trojan

Software that infects a computer and is created by computer code is called a ________.

virus

Software that infects computers and is created using computer code is called a computer _____.

virus

Which of the following are widely used tactics that can keep you safe on the Web?

Consider using a VPN Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS. Use your browser's private browsing mode.

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS

Which three of the following are ways to prevent computer virus infections?

Install the latest antivirus software and update frequently. Web surfing should be limited to trusted sites. Downloaded content from the web should only be from trusted sites.

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.

cybercrime

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

opening an infected e-mail attachment inserting and opening an infected thumb drive sharing an infected file


Conjuntos de estudio relacionados

CORE Addendum: Important terms & concepts

View Set

Pneumothorax & Hemothorax (NCLEX) Practice Questions

View Set

COMP2190 - Net Centric Computing - Chapter 2

View Set

The Framework for Consumer Analysis

View Set

Sepoy Rebellion, Indian Independence, and British Imperialism

View Set