CIS-computer security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Select what is true regarding keystroke loggers

-keystroke loggers can record passwords and confidential information -can be hardware devices and software applications -software based keystroke loggers are often a trojan that is installed without the user's knowledge

Which of the following can help prevent a virus infection?

-never bypass your browser's built-in security features -adjust your web browser's security settings to allow browsing only on trusted sites

A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ____.

Cyberattack

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan horse

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services

UBE

A destructive program that replicates itself throughout a single computer or across a network is called a ____.

Worm

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cybercrime

Retpoline, a strategy to mitigate the meltdown and spectre vulnerabilities, was developed by the project zero labs at ____, a company better known for its search engine and its pixel 2 smartphone

google

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in _____ mood

safe

First-party cookie

small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Web cookie

small text file of information created by websites you visit that your web browser stores on your hard disk

Initally, the united states computer emergency readiness team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processors

spectre, meltdown

Software that collects information about your internet surfing habits and behaviors is called ___.

spyware

Which of the following are symptoms of an online nuisance attack

-frequent pop-ups while searching the web or working in programs -receiving a lot of spam messages or bounced back email messages -pop up start appearing after you visit unfamilar sites

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

Signature-based, heuristic-based

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ______.

cyberterrorist

select the privacy risks associated with cookies

-websites using cookies can collect your information and sell it to third parties -websites can track your surfing behavior and create a profile -corporate and government entities can track your web behavior

Which of the following are ways that computer viruses can infect a digital device ?

-opening an infected email attachment -downloading an infected file from the internet -visiting a contaminated website

Keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

Ransomware

when activated, encrypts files on user hard drive and then sells a decryption program

A computer controlled by a hacker is called a ____.

Zombie

Select whats true about spyware

-installed via free downloads or by visiting certain illegitimate websites -includes the collection of keystrokes, passwords, and confidential information -collects information about your internet surfing habbits

Select whats true about macro viruses

-commands in the macro language set off the destructive -when file is opened the macro virus executes -initiated by downloading and opening an infected attatchment

Rootkits are typically used to allow hackers to do which of the following

-encrypt files -install rouge files -create backdoors

According to US-CERT, if you recieve a phishing message, which of the following methods should use to report the issue?

-in outlook, you can create a new message and drag the phishing email into the new message. Send it to [email protected] -contact the via the phone number listed on the US-CERT site

Malware is designed to do which of the following

-incapacitate a computer or network -destroy data -steal information

Put the steps in order for turning on parental controls in microsoft windows in order

1. Open parental controls 2. Click the standard user account that you want to use to set parental controls for 3. Under parental controls click "on" then enforce current settings 4. Adjust time limits, access to specific programs, access to specific websites

A group of compromised computers controlled by a hacker is called a _____.

Botnet

Cyber attacks include

DDOS attacks Identity theft Pharming

Correctly identify the terms that are associated with hackers and online nuisances

HACKER: Cyberterrorist, Black hat, Script Kiddle, White hat ONLINE NUISANCES: Spam, adware, spyware

The technology that provides a type of firewall protection by hiding internal IP addresses is called ____.

NAT

Typically computer viruses must be _____ to attack and do damage to a digital device

Opened & run

Stored on a users hard drive, cookies that collect information aboht user preferences, passwords and username information, IP address, and data on web-surfing behavior are referred to as _____ cookies

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer and directs them to a fake webpage is called _______ .

Pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as _____.

Pharming

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called

Ransomware

One version of this malware encrypts the victims data until a payment is made. Another version threatens to make public the victims personal data unless a payment is made. The malware is called ____.

Ransomware

a type of malware that is triggered each time you boot your computer is called a ____.

Rootkit

Stored in a temporary memory, ____ cookies are used to analyze and measure traffic on a webpage

Session

Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a _____ filter

Spam

Which of the following are online nuisances?

Spam Spyware Spoofing

A type of malware that replicates itself throughout a single computer or across a network is called a _____.

Worm

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

Zombie

Developed by cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses

address

software that collects a user's web browsing history to create unsolicited targeted pop up ads is called ___.

adware

An internet filter is a firewall software used to block a users access to specific internet content. An internet filter can be installed on which of the following?

computer, server, router

Small text files created by websites you visit that your web browser stores on your hard disk is called ____.

cookies

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Experts suggest using password ____ software to keep your passwords safe

management

Software programs that hide in the operating system and allow for the installation of hidden files are called ____.

rootkits

The software code of a particular computer virus is called the virus ____.

signature

Third-party cookie

small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Unsolicited email is _____.

spam

Phishing

tricks users into revealing usernames and passwords by appearing legitimate

Persistent cookies store information about

user preferences, password and username information

Common types of malware include

viruses, worms, trojan

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ____.

Phishing


Kaugnay na mga set ng pag-aaral

Prep U: Chapter 64 Adult Nursing

View Set

NCLEX - Adolescent Health Promotion

View Set