ITEC Chapter 7
Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality?
- Access control - Encryption - Authentication
According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.
- Access to important data is limited so that only certain employees are able to modify that data. - During an acquisition, logistics data are securely transferred to the acquiring company's servers.
When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.
- Authentication - Access control
Which three of the following statements are true about spyware?
- Collects information about your Internet surfing habits and behaviors. - Includes the collection of keystrokes, passwords, and confidential information - Installed via free downloads or by visiting certain illegitimate websites.
Which of the following are symptoms of an online nuisance attack?
- Pop-ups start appearing after you visit unfamiliar sites. - Receiving a lot of spam messages or bounced back e-mail messages. - Frequent pop-ups while searching the web or working in programs
Which three of the following are factors to consider to help protect the hardware of your digital device?
- Protecting a digital device from overheating - Protecting a digital device from humidity - Protecting a digital device from magnetic fields
Which of the following are online nuisances?
- Spam - Spoofing - Spyware
Select three privacy risks associated with cookies.
- Websites can track your surfing behavior and create a profile. - Websites using cookies can collect your information and sell it to third parties. - Corporate and government entities can track your web behavior.
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:
- account numbers - keystrokes - passwords
If you believe you have fallen victim to a phishing scam you should:
- contact US-CERT - contact the institution the message was allegedly sent from
Select 3 ways in which computer virus commonly infect vulnerable digital devices. Multiple select question.
- opening an infected e-mail attachment - inserting and opening an - - infected thumb drive sharing an infected file
Firewall
A component of a network that is designed to prevent unauthorized Internet intrusions
Keystroke Logger
A cybercriminal uses this spyware to record all actions typed on a keyboard.
worm
A destructive program that replicates itself throughout a single computer or across a network
Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?
Availability
Pharming
Creating a fake webpage to trick victims into divulging personal information is a type of phishing
Internet filter
Firewall software used to block a user's access to specific Internet content
Network Address Translation (NAT)
It provides a type of firewall protection by hiding internal IP addresses.
Ransomeware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code
Ransomware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate.
Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.
UBE
Ransomware
When activated, encrypts files on user hard drive and then sells a decryption program.
Keystroke-logging Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator.
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
e-mail virus
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
Overheating, humidity, and magnetic fields can cause damage to the ____ of a digital device
hardware
Typical Password Manager
is installed as a browser plug in and provides for extremely secure logins.
Malware is short for_____.
malicious software
Experts suggest using password____ software to keep your passwords safe.
management
Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an ____ nuisance.
online
Adware often accompanies downloaded _____.
programs
Often, to actually launch an attack on a computer, a virus must be opened and ___.
run
In Facebook, where would you click to download a copy of your Facebook data?
settings
Spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Most e-mail applications, such as Gmail and Outlook, provide robust _____ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.
spam
Which three of the following you should consider in the settings area of each browser?
- Blocking or customizing your cookie settings - Decide from which sites you want to allow cookies - Deleting cookies
Which two of the following can help prevent a virus infection?
- Never bypass your browser's built-in security features. - Adjust your web browser's security settings to allow browsing only on trusted sites.
zombie
A computer that has been taken over by a hacker, typically by using a rootkit
Cyber crime
A crime in which a computer is the object of the crime or is used to commit a criminal offense
Anti-malware apps
Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.
computer virus
Software that infects computers and is created using computer code
One of the risks with cookies is ___.
websites using cookies can collect your information and sell it to third parties
Which of the following three statements are true regarding macro viruses?
- Commands in the macro language set off the destructive events. - When file is opened the macro virus executes. - Initiated by downloading and opening an infected attachment.
Which of the following is an example of a tool that could be used to ensure data integrity?
- Data are regularly backed up. - Data correction codes are used to ensure the data retrieved are the same as when it was stored
Which of the following three statements are true regarding keystroke loggers?
- Keystroke loggers can record passwords and confidential information. - Software-based keystroke loggers can be installed by Trojans without the user's knowledge. - Can be hardware devices and software applications.
Which three of the following are well-known e-mail attacks?
- Keystroke-logging Trojan - Phishing - Ransomware
Which of the following three statements are true about Trojan malware?
- Often used to find passwords, destroy data, or to bypass firewalls. - Similar to viruses, but do not replicate themselves. - Often found attached to free downloads and apps.
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
- Server - Router - Computer
Cyberattack
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network
Keylogger
A form of spyware that records all actions typed on a keyboard
Botnet
A group of compromised computers controlled by a hacker
Adware
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements
Which three of the following are ways to prevent computer virus infections?
- Install the latest antivirus software and update frequently. - Web surfing should be limited to trusted sites. - Downloaded content from the web should only be from trusted sites.
Select two true statements about packet sniffers.
- Unauthorized sniffers are used to steal information. - Legitimate sniffers are used for routine examination and problem detection.
If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.
False
Trojan
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated
Packet Sniffers
Specialized hardware or software that capture packets transmitted over a network
Which of the following are widely used tactics that can keep you safe on the Web?
- Consider using a VPN - Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS. - Use your browser's private browsing mode.
Malware may be designed to do which three of the following?
- Destroy data - Incapacitate a computer or network - Steal information
Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools ensures confidentiality. More than one answer may be correct.
- Encryption - Authentication - Access control
Which of the following may be indications that your system has been hacked? (Select all that apply.)
- Fake e-mails or social media messages in your account - The computer turns on or off by itself - Frequent random pop-ups - Unwanted browser toolbars
Computers infected with a virus exhibit many symptoms including which three of the following?
- Files get deleted or encrypted - OS does not launch properly - Strange error messages or pop-up ads
macro virus
A virus written in a macro language and placed within a document or spreadsheet
Ways to catch a computer virus
Downloading files from questionable Internet sites , Finding a thumb drive and then using it in your laptop
Anti-virus programs
Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats.
Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This software is called _____.
Spam filter
Typically computer viruses must be _____ to attack and do damage to a digital device.
open and run
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called ______.
pharming
The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ____.
phishing
According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?
- In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. - Contact the via the phone number listed on the US-CERT site.
distributed denial-of-service (DDoS) attack
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests
Which of the following is true about worms?
Automatically reproduces itself
cyberbullying
Harming or harassing via information technology and networks in a repeated and deliberate manner
Virus symptoms
The operating system does not launch properly , Critical files are deleted automatically
Virtual Private Network (VPN)
a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)_____
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called____.
ransomware
Cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons
Password
A secret code used to help prevent unauthorized access to data and user accounts
Rootkit
A type of malware that is triggered each time you boot your computer
spam filter
Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox
Which of the following organization you should contact if you receive a phishing message?
US-CERT
Computer viruses can infect a digital device in which three of the following ways?
- Opening an infected e-mail attachment - Visiting a contaminated website - Downloading an infected file from the Internet
Which three of the following statements are true regarding passwords and passcodes?
- Passwords can be used to secure computers, networks, software, personal accounts, and digital devices - The terms passcode and key are synonymous for password - Keys are often generated by encryption software or by the vendor who produced the software
Which two of the following statements are true regarding firewalls?
- The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.
Black hat hackers
A person who breaks into computer systems with the intent of causing damage or stealing data.
Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.
- Having standby equipment available to take over in a situation where the main system fails. - Ensuring that the data server has an appropriate amount of bandwidth. - Storing data on multiple hard drives.
Which of the following two statements best describe phishing?
- Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. - Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.
Cookies
Small text files created by websites you visit that your web browser stores on your hard disk
Rootkits are typically used to allow hackers to do which two of the following?
- Install rogue files - Create backdoors