Computer security Quiz
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
You must individually adjust cookie settings in every browser you use.
True
Spam messages are sometimes referred to as ___.
UBE
Select what's true about the privacy risks with cookies.
Websites using cookies can collect your information and sell it to third parties. Websites can track your surfing behavior and create a profile. Corporate and government entities can track your web behavior.
A group of compromised computers controlled by a hacker is called a _____.
botnet
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
Select what's true about worms.
designed to attack only wired networks
An unsolicited email message is called _____.
spam
A computer controlled by a hacker is called a _____.
zombie
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
There are a variety of cookie settings that can be adjusted in Google Chrome including.
creating third-party cookies.
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
hacktivism
Identify what's true about script kiddies.
have the skill or experience to write their own programs are usually females between the ages of 30 and 50
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Which of the following are common email viruses.
keystroke logging Trojan, Ransomware
Select what's true about Trojan malware.
often found attached to free downloads and apps often used to find passwords, destroy data, or to bypass firewalls
In the settings area of each browser you should consider
periodically deleting cookies. blocking/customizing your cookie settings. decide from which sites you want to allow cookies.
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers