Computer security Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

You must individually adjust cookie settings in every browser you use.

True

Spam messages are sometimes referred to as ___.

UBE

Select what's true about the privacy risks with cookies.

Websites using cookies can collect your information and sell it to third parties. Websites can track your surfing behavior and create a profile. Corporate and government entities can track your web behavior.

A group of compromised computers controlled by a hacker is called a _____.

botnet

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

Select what's true about worms.

designed to attack only wired networks

An unsolicited email message is called _____.

spam

A computer controlled by a hacker is called a _____.

zombie

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

There are a variety of cookie settings that can be adjusted in Google Chrome including.

creating third-party cookies.

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

hacktivism

Identify what's true about script kiddies.

have the skill or experience to write their own programs are usually females between the ages of 30 and 50

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Which of the following are common email viruses.

keystroke logging Trojan, Ransomware

Select what's true about Trojan malware.

often found attached to free downloads and apps often used to find passwords, destroy data, or to bypass firewalls

In the settings area of each browser you should consider

periodically deleting cookies. blocking/customizing your cookie settings. decide from which sites you want to allow cookies.

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers


Kaugnay na mga set ng pag-aaral

S-IV Sentence Pattern (Present tense)

View Set

Ch. 5 Quiz "Sociology In Our Times"

View Set

NVNU. Antipodagriniai ir antireumatiniai vaistai.

View Set

abdominal aortic aneurysm practice questions

View Set

History Social Impact of the Industrial revolution

View Set

Congenital Heart Disease in Children

View Set

Google Analytics study questions

View Set