Computer Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Settings

In Facebook, where would you click to download a copy of your Facebook data?

Home address Email address Name

In Firefox, cookies can store a wide range if information including which of the following?

sharing an infected file inserting and opening an infected thumb drive opening an infected e-mail attachment

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

Store site preferences Surfacing of local (geotargeted) content Remain signed into websites

The use of cookies allows you to do which of the following?

hacker, cyberhacker, cracker, black hat hacker, cyber hacker, or blackhat hacker

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ___________.

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse

DoS, denial of service, distributed denial of service, denial, DDoS, ddos, or dos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _______ of service attack.

ransomware

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called _________.

Keystroke-logging Trojan Phishing Ransomware

Which three of the following are well-known e-mail attacks?

opened and run

Typically computer viruses must be _____ to attack and do damage to a digital device.

keystroke or key

A form of spyware that records all actions typed on a keyboard is called a __________ logger.

Ways to catch a computer virus

Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

malicious, malicious software, or malware

Malware is short for __________ software.

Incapacitate a computer or network Steal information Destroy data

Malware may be designed to do which three of the following?

ransomware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

Ways to catch a computer virus

Opening suspicious or infected e-mail messages. Visiting questionable websites.

spyware

Software that illicitly collects information about your Internet surfing habits and behaviors is called _________.

Virus symptoms

The operating system does not launch properly Critical files are deleted automatically

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Programs launch on their own Documents will not save

What are the two common symptoms of a computer virus?

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

Zombie

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.

cyberattack, cyber attack, cybercrime, cyber crime, cyber-attack, cyberattacks, or cyber-attacks

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a __________.

keystroke logger

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

DDoS or DoS

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

Internet

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Anti-malware apps

Help protect against malware: These apps help protect against a variety of malicious programs.

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Email

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email, e-mail, Email, or e mail

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ____________.

run

Often, to actually launch an attack on a computer, a virus must be opened and ___.

adware

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

keystrokes account numbers passwords

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

cyberattacks

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

Keystroke-logger Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Viruses Worms Trojans

Which of the following three are common types of malware?

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.

Which two of the following statements are true regarding firewalls?

Private

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Anti-virus programs

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

ransomware

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .

sniffers or sniffer

Specialized hardware or software that capture packets transmitted over a network are called packet _________.

Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications.

Which of the following three statements are true regarding keystroke loggers?

Includes the collection of keystrokes, passwords, and confidential information Collects information about your Internet surfing habits and behaviors. Installed via free downloads or by visiting certain illegitimate websites.

Which three of the following statements are true about spyware?

Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.

Which two of the following can help prevent a virus infection?

zombie, botnet, or bot net

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _________. An army of these are used to launch denial of service (DoS) attacks.

Button 4

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Settings

When you open the options tab in Firefox, after you select the menu button, where would you click to adjust cookie settings?

virus

Software that infects computers and is created using computer code is called a computer _____.

Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls.

Which of the following three statements are true about Trojan malware?

Put the following steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus 3. The payload is activated and the virus starts its destructive actions.

Distributed Denial of Service

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

keystroke

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

programs

Adware often accompanies downloaded _____.

Visiting a contaminated website Opening an infected e-mail attachment Downloading an infected file from the Internet

Computer viruses can infect a digital device in which three of the following ways?

OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads

Computers infected with a virus exhibit many symptoms including which three of the following?

e-mail virus

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

adware

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called __________.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.

Select two true statements about packet sniffers.

Ways to avoid a computer virus

Adjust your web browser's security settings to allow browsing only on trusted sites. Surf the web and download content safely.

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

The 3-dot "Settings and more" icon

To adjust cookies in Edge, where would you click first?

Server Router Computer

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?


Conjuntos de estudio relacionados

Solving and Graphing Linear Equations

View Set

Week 2 Organizational Environment, Structure, and Change

View Set

Module 15: Nuclear Proliferation

View Set

Water Resources Final Exam Material

View Set

Chapter 1-6 Exam Questions_Robins & Cotran

View Set

Population Health Final Exam Review

View Set

Blueprint: Stoichiometry and Basic Chemistry Math

View Set

Encyclopedia of Counseling: Ch 3 - Human Growth and Development, Encyclopedia of Counseling: Ch 9 - Research and Program Evaluation, Encyclopedia of Counseling: Ch 11 - Counseling Families, Diagnosis, and Advanced Concepts, Encyclopedia of Counseling...

View Set

Chapter 9 Microbial Genetics Learn Smart

View Set