computer security unit
Put the following steps of a virus infection in the correct order. Instructions
1. The virus arrives via email attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. They payload is activated and the virus starts its destructive actions.
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.
DoS
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
Which three of the following statements are true about spyware?
Installed via free downloads or by visiting certain illegitimate websites. Includes the collection of keystrokes, passwords, and confidential information Collects information about your Internet surfing habits and behaviors.
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
e-mail virus
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse virus.
trojan
Select two true statements about fee-based (subscription-based) and free antivirus software programs.
Most fee-based software comes with technical support One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
Private
Software that illicitly collects information about your Internet surfing habits and behaviors is called
spyware
Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?
Fee-based antivirus software often provides more features than free anti-virus software.
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a
hacker
Often, to actually launch an attack on a computer, a virus must be opened and ___.
run
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.
keystroke
There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.
Which three of the following are well-known e-mail attacks?
Keystroke-logging Trojan Phishing Ransomware
Which of the following three statements are true about Trojan malware?
Often used to find passwords, destroy data, or to bypass firewalls. Often found attached to free downloads and apps. Similar to viruses, but do not replicate themselves.
Which three of the following are ways to prevent computer virus infections?
Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently. Downloaded content from the web should only be from trusted sites.
On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?
advanced
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.
hacker
Phishing Ransomware Keystroke-logging Trojan
Tricks users into revealing usernames and passwords by appearing legitimate. When activated, encrypts files on user hard drive and then sells a decryption program. When activated, saves all keystrokes for subsequent transmission to virus creator.
Adware often accompanies downloaded _____.
programs
Which two of the following can help prevent a virus infection?
Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.
What are the two common symptoms of a computer virus?
Programs launch on their own Documents will not save
An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Server Router Computer
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
trojan
Software that infects computers and is created using computer code is called a computer _____.
virus
Firewalls Anti-virus programs Anti-malware apps
Help protect against worms and hackers: Firewall programs help protect against worms and hackers. Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats. Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ________ of service attack.
DoS
Which two of the following statements are true regarding firewalls?
Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.
Computer viruses can infect a digital device in which three of the following ways?
Opening an infected e-mail attachment Visiting a contaminated website Downloading an infected file from the Internet
Virus symptoms Ways to catch a computer virus
The operating system does not launch properly, Critical files are deleted automatically Downloading files from questionable Internet sites, Finding a thumb drive and then using it in your laptop
Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called
adware
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:
keystrokes account numbers passwords
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
ransomware
In Facebook, where would you click to download a copy of your Facebook data?
settings
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a
cyberattack
Which of the following three statements are true regarding keystroke loggers?
Can be hardware devices and software applications. Keystroke loggers can record passwords and confidential information. Software-based keystroke loggers can be installed by Trojans without the user's knowledge.