Mod 10, Comp Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Software that collects a users web, browsing history to create unsolicited. Targeted pop-up advertisements is called

Adware

Select three functions of session cookies

Analyze and measure traffic on a webpage Determine the start and end of the session Determine the web browser being used

A___hat hacker breaks into computer systems with the intent of causing damage or stealing data

Black

A group of comprise computers controlled by a hacker is called a

Botnet

Select three true statements regarding persistent cookies

Collect information about the Internet protocol address Collect password and username information Collect information about user preferences

Which of the following are widely used tactics that can keep you safe on the web

Consider using a VPN Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS.

Small text files created by websites you visit that your web browser stores on your hard disk are called

Cookies

Select three privacy risks associated with cookies

Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.

Route kids are typically used to allow hackers to do which three of the following

Create back doors Install rogue files

A deliberate miss use of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or net work is called a

Cyber attack

The deliberate miss use of computers and networks______use malice code to modify the normal operations of a computer or net work

Cyber attacks

A person who harms or harasses via information, technology and networks in a repeated and deliberate manner is called a

Cyber bully

Harming, or harassing via information, technology and networks in a repeated and delivered manner is called

Cyber bullying

Mary uses computers and the Internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber.

Cyber terrorist

A hacker launches in attack on a net work that is designed to interrupt or stop network traffic by flooding it with too many requests this is called a

DDoS or DoS attack

ADDoS attack is when computers that have been infected by a virus, active zombies, and work together to send out illegitimate messages, creating huge volumes of network traffic, the acronym DDoS stands for

Distributed denial of service

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a.

Email virus

Hardware or software used to keep a computer secure from outside threats, such as hackers in viruses by allowing or blocking Internet. Traffic is called a

Firewall

Juan, attempt to gain on authorize access to networks. Juan would be considered a.

Hacker

Hacking computer systems for political or socially motivated purposes is called a

Hacktivism

A category of cyber terrorism that focuses on hacking computer systems for political or social he motivated purposes is

Hacktivist

Which two of the following are true about script kiddies

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Firewall software used to block a users access to specific Internet. Content is called a___filter.

Internet

A form of spyware that records all actions typed on a keyboard is called a

Keylogger

A cyber criminal use a spyware to record all actions typed on a keyboard. This type of spyware is called a___logger

Keystroke

A form of spyware/surveillance technology that records all typed action is referred to as a

Keystroke logger

Which of the following three statements are true regarding keystroke loggers

Keystroke loggers can record passwords and confidential information. Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Can be hardware devices and software applications.

Select two true statements about packet sniffer's

Legitimate sniffers are used for routine examination in problem detection Unauthorized sniffers are used to steal information

A virus written in a specific language in placed within a document or spreadsheet, is called a

Macro virus

A virus written in macro language in place within a document or spreadsheet, is called a

Macro virus

Which two of the following can prevent a virus infection

Never bypass your browsers, built-in security features Adjuster web browser security settings to allow browser is only using trusted sites

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a.

Password

A user account is often identified by a username. A secret code used to help prevent unauthorized access to data and user account is called a

Password

Persistent cookies, store information about which two of the following

Password and username information User preferences

Which three of the following statements are true, regarding passwords and pass codes

Passwords can be used to secure, computers and networks software, personal accounts, and digital devices Keys are often generated by encrypted, software, or by the vendor who produced the software The terms pass code in key are synonymous for password

Stored on a users, hard drive, cookies that collect information about user preferences, password, and username information, IP address, and data on web surfing behaviors are referred to as__cookies

Persistent

A type of phishing that seeks to obtain personal information through malice software that is inserted on victims computers in direction to a fake website is called

Pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

Pharming

The illegitimate use of email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution or insurance company is called

Phishing

Mini cyber attacks are transmitted via email select three common forms of malware that are commonly sent by email

Phishing Keystroke logging Trojan Ransom ware

Which of the following two statements best describes phishing

Phishing is the illegitimate Yusuf email messages that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving a private information

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a net work?

Proxy

Typical firewall programs or hardware devices filter, all information coming through the Internet to your net work or computer system, which two of the following are techniques used to minimize the risk of harmful intrusion into a computer or net work

Proxy servers Packet filters

Malware that encrypted computers data, forcing the victim to purchase a description code is called

Ransom ware

Which three of the following are well known email attacks

Ransom ware Phishing Keystroke logging Trojan

A type of malware that is triggered each time you boot. Your computer is called a

Rootkit

A type of malware that is triggered each time you boot. Your computer is called a.

Rootkit

And Internet/Contin filter is firewall software used to block a users access to specific Internet content. And Internet filter can be installed on which three of the following.

Router Server Computer

How do computer viruses attack? Often, to actually launch in attack on a computer, a virus must be opened, and

Run

Amateur computer hackers with a little programming expertise who illegally gain access to computer systems using programs that others have written are called___kitties

Script

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Software that illiclitly collects information about your Internet, surfing habits and behavior is called

Spyware

Which two of the following statements are true regarding firewalls

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.

A program that appears legitimate, but in X users on wanted activity when activated is called a___horse virus

Trojan

Often accompanying downloaded apps a program that appears to be legitimate, but excuses and unwanted activity when activated is called

Trojan

Which two of the following statements are true about passwords

Use a combination of letter, symbols and numbers the more characters you use the more secure your password will be Check your account regularly check your account to ensure they have not been tampered with

One risk with cookies is

Websites using cookies can collect your information and sell. It's a third parties.

Computer expert who attempt to hack into a network to ensure that it is protected against intrusions are called____ hat hackers

White

Safety, shield, employees, computer, experts, who test the security measures of an organizations information systems to ensure they are protected against intrusion. These safety shield employees are called.

White hat hacker

A destructive program that replicate itself throughout a single computer or across a network is called a

Worm

A destructive program that replicates itself throughout a single computer or crossing network, is called a

Worm

Wyatt needs a password for his schools email system which password is the most secure

XJ 9% ST7

A computer that has been taken over by a hacker typically buy a route kit is referred to as a.

Zombie

A computer that has been taken over by a hacker typically, by using its root kit, is referred to as a

Zombie

Your computer has been hacked and overtaken by a hacker. The hacker has control over your computer and how you now used to launch attacks on other computers and systems your computer is known as a.

Zombie

What type of hacker breaks into computer systems with the intent of causing damage or stealing data

black hat hacker

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

Which component of a network designed to prevent unauthorized Internet intrusions

firewall

A person who gains unauthorized access to networks in order to steal a corrupt information, and data is called a

hacker

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

Adware often accompanies downloaded

programs

In Facebook where would you click to download a copy of your Facebook data?

settings

Specialized hardware or software that capture packets, transmitted over a network are called packet

sniffers

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a __ filter.

spam

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

ube

Software that infects computers and is created using computer code is called a computer

virus

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word


Conjuntos de estudio relacionados

CHEM 1442: Exam 2 Practice Questions (ch. 13,14)

View Set

Chapter 8 Workbook-Cervical & Thoracic Spine

View Set

Chapter 5 - Integumentary System

View Set