Cybersecurity
hacktivis
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is
zombie
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _. An army of these are used to launch denial of service (DoS) attacks.
the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system
A cybersecurity exploit is ______.
keystroke
A form of spyware that records all actions typed on a keyboard is called a ________ logger.
black
A hat hacker breaks into computer systems with the intent of causing damage or stealing data.
trojan
A program that appears legitimate, but executes an unwanted activity when activated is called a horse virus.
rootkit
A type of malware that is triggered each time you boot your computer is called a
macro artist
A virus written in a macro language and placed within a document or spreadsheet is called a _____ .
script
Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called kiddies.
Router Server Computer
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
white
Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called hat hackers.
Rootkits are typically used to allow hackers to do which two of the following?
Create backdoors Install rogue files
address
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network Translation provides a type of firewall protection by hiding internal IP addresses.
internet
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
- Name - Email address - Home address
In Firefox, cookies can store a wide range if information including which of the following?
apple menu
On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?
- Password and username information - User preferences
Persistent cookies store information about which two of the following?
Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.
Select two true statements about packet sniffers.
Third-party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
First-party cookie
Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk:
Persistent
Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.
a weakness in application software
Suppose an organization's system is vulnerable to losing information because its automated backup of data is insufficient or substandard. This type of cybersecurity vulnerability is ______.
events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss
The main characteristics that define cybersecurity threats are ______.
NAT (Network Address Translation)
The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.
Proxy servers Packet filters
Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?
A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.
What is the correct definition of a cybersecurity exploit?
session
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
black hat hacker
What type of hacker breaks into computer systems with the intent of causing damage or stealing data?
proxy
What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?
firewall
Which component of a network designed to prevent unauthorized Internet intrusions?
Impersonation Spyware Viruses Distributed Denial of Service (DDOS)
Which of the following are considered cybersecurity breaches? More than one option may be correct.
Ensuring that the data server has an appropriate amount of bandwidth. Having standby equipment available to take over in a situation where the main system fails. Storing data on multiple hard drives.
Which of the following is a best practice for ensuring that data are available? More than one answer may be correct. Multiple select question.
Frequent random pop-ups Unwanted browser toolbars Fake e-mails or social media messages in your account The computer turns on or off by itself
Which of the following may be indications that your system has been hacked? (Select all that apply.)
Ransomware Phishing Keystroke-logging Trojan
Which three of the following are well-known e-mail attacks? Multiple select question.
Limit access to specific websites Restrict user's access to other people through Game Center, Mail, and Messages Which apps the user can access
Which three of the following settings can you restrict in the Mac OS?
Passwords can be used to secure computers, networks, software, personal accounts, and digital devices Keys are often generated by encryption software or by the vendor who produced the software The terms passcode and key are synonymous for password
Which three of the following statements are true regarding passwords and passcodes?
Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.
Which two of the following statements are true regarding firewalls?
script kiddies
Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.
DDOS
______ are cybersecurity breaches that make a computer or online service unavailable to its users.
Unintentional, accidental, and incidental events Misuse or abuse of IT assets Intentional events Failure of IT assets Errors, weaknesses, or defects in IT assets
all types of events and conditions that are considered cybersecurity threats.
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a .
hacker
Security weaknesses in an operating system or application software Weaknesses or flaws in a system's security design Weaknesses or flaws in system security control Weaknesses or flaws in system security implementation Weaknesses in system security procedures
select all types of cybersecurity vulnerabilities. Multiple select question.