Chapter 5 Connect
Identify common symptoms of a computer virus.
-Documents won't save -Computer runs extremely slowly -Programs launch on their own
Select what's true about packet sniffers
-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information. Packet sniffers use viruses to capture data packets
Which of the following are online nuisances?
-spam -spyware -spoofing
Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.
Choose Safari Click Preferences Click Privacy Change cookie settings.
According to US-CERT if you receive a phishing message you should contact them using which of the following methods.
In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to phishing- report@us-cert. gov and send it. In Outlook Express you can also open the emial message and selecct File> Proprties> Details.
Which of the following are considered cybercrimes?
Internet scams Information theft cyberespionage
Which of the following are ways to prevent computer virus infections.
Limit your web surfing to trusted sites. Install the latest antivirus software and update it frequently.
A program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus.
Trojan
Spam messages are sometimes referred to as ___.
UBE
Select what's true about the privacy risks with cookies.
Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior.
A group of compromised computers controlled by a hacker is called a _____.
botnet
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of
confidential information passwords
The malicious use of computer code to modify the normal operations of a computer or network is called a ______.
cyberattack
Common symptoms of a computer virus infection include
files get deleted or encrypted strange error messages or pop up ads OS doesn't launch properly.
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
hacktivism
Cyberattacks include
identity theft DDoS attacks
identify what's true about script kiddies.
illegally gain access to computer systems using programs (scripts) that others have written, amateur computer hackers with little programming expertise.
A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.
macro
Two common categories of cybercrimes include single events and _____ series of events.
on-going
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
Select what's true about worms.
replication exhausts network bandwidth or available storage often sent using email attachments. automatically reproduce.
amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________
script kiddies
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
An unsolicited email message is called ____.
spam
Software that collects information about your internet surfing habits and behaviors is called
spyware
Persistent cookies store information about
user preferences
Software that infects a computer and is created using computer code is called a computer _____.
virus
Non-malicious computer security expert that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hakers
white hat
A destructive program that replicates itself throughout a single computer or across a network is called a
worm
A computer controlled by a hacker is called a
zombie
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.
Trojan horse
Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.
True
A ____ hat hacker breaks into computer systems with the intent of causing damage or stealing data
black
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Select what's true about session cookies.
Area stored on the computer's hard drive -Analyze and measure traffic on a web page. -Determine the web browser being used.
According to Mozilla, one of the most efficient ways to clear cookies in Firefox is:
Click the menu button, choose History, and then Clear Recent History. Once you have cleared recent history you should set the time range to clear Everything. Click on the arrow next to Details to expand list of history items Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Select what's true about Trojan malware.
-often found attached to free downloads and apps similar to adware often used to find passwords, destroy data, or to bypass firewalls
Which of the following are common email viruses.
-ransomware -keystroke logging Trojan adware
You must individually adjust cookie settings in every browser you use.
True
You can change your Firefox settings to allow you to
approve cookie storage requests delete stored cookies automatically when you start Firefox. deny cookie storage requests.
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ______.
cyberterrorist
Rootkits allow a remote user to do which of the following.
install rogue files create backdoor programs install drivers
The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called _____.
phishing
Cookies that are held in temporary memory and used to analyze and measure traffic on a Web page are called ___ cookies.
session
Common types of malware include ______.
virus, worm, and trojan horse
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cybercrime
Which of the following could be considered a cybercrime?
data manipulation
What are more examples of cybercrimes?
data manipulation data corruption cyberbullying
If you believe you have fallen victim to a phishing scam you should
contact the institution the message was allegedly sent from contact US-CERT contact your ISP
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
zombie
Which of the following are cookie settings you can adjust in Internet Explorer ( Microsoft Edge).
delete cookies block cookies allow cookies
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
In the settings area of each browser you should consider
blocking/customizing your cookie settings. decide from which sites you want to allow cookies. adjusting your firewall settings
A smal text file of information created by websites you visit that your web browser stores on your hard disk is called
cookie
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
According to Micorsoft, the most effcient order of steps to customize cookie setting is?
Open the desktop, and then tap or click the Internet Explorer Tap or click the Tools button Tools, and then tap or click Internet options. On the Privacy tab, do one or more of the following: to set what types of cookies are blocked or allowed, move the slider. When you're done making changes, tap or click OK.
According to Microsoft, what is the correct order of steps for deleting cookies in Internet Explorer (Microsoft Edge)?
On the Start screen, tap or click Internet Explorer to open Internet Explorer. Swipe in from the right edge of the screen and then tap Settings. ( If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Setting. Tap or click Options, and then, under History, tap or click Select Select the Cookies check box, then tap or click Delete.
There are a variety of cookie settings that can be adjusted in Google Chrome including
blocking/allowing cookies by default making exceptions for cookies from specific websites or domains. deleting cookies
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____.
adware
Put the steps of a virus infection in the correct order
The virus arrives via Email attachment, file download, or by visiting an infected site An action such as running or opening the file triggers the virus The infection is spread to other devices or a network The payload is activated and the virus starts its destructive actions.