Computer Security
Settings
In Facebook, where would you click to download a copy of your Facebook data?
Home address Email address Name
In Firefox, cookies can store a wide range if information including which of the following?
sharing an infected file inserting and opening an infected thumb drive opening an infected e-mail attachment
Select 3 ways in which computer virus commonly infect vulnerable digital devices.
Store site preferences Surfacing of local (geotargeted) content Remain signed into websites
The use of cookies allows you to do which of the following?
hacker, cyberhacker, cracker, black hat hacker, cyber hacker, or blackhat hacker
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ___________.
Trojan
A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse
DoS, denial of service, distributed denial of service, denial, DDoS, ddos, or dos
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _______ of service attack.
ransomware
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called _________.
Keystroke-logging Trojan Phishing Ransomware
Which three of the following are well-known e-mail attacks?
opened and run
Typically computer viruses must be _____ to attack and do damage to a digital device.
keystroke or key
A form of spyware that records all actions typed on a keyboard is called a __________ logger.
Ways to catch a computer virus
Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop
malicious, malicious software, or malware
Malware is short for __________ software.
Incapacitate a computer or network Steal information Destroy data
Malware may be designed to do which three of the following?
ransomware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
Ways to catch a computer virus
Opening suspicious or infected e-mail messages. Visiting questionable websites.
spyware
Software that illicitly collects information about your Internet surfing habits and behaviors is called _________.
Virus symptoms
The operating system does not launch properly Critical files are deleted automatically
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate.
Programs launch on their own Documents will not save
What are the two common symptoms of a computer virus?
Ransomware
When activated, encrypts files on user hard drive and then sells a decryption program.
Zombie
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.
cyberattack, cyber attack, cybercrime, cyber crime, cyber-attack, cyberattacks, or cyber-attacks
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a __________.
keystroke logger
A form of spyware/surveillance technology that records all typed actions is referred to as a ___.
DDoS or DoS
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.
Internet
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Anti-malware apps
Help protect against malware: These apps help protect against a variety of malicious programs.
Firewalls
Help protect against worms and hackers: Firewall programs help protect against worms and hackers.
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
email, e-mail, Email, or e mail
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ____________.
run
Often, to actually launch an attack on a computer, a virus must be opened and ___.
adware
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
keystrokes account numbers passwords
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:
cyberattacks
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
Keystroke-logger Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator.
Viruses Worms Trojans
Which of the following three are common types of malware?
The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.
Which two of the following statements are true regarding firewalls?
Private
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
Anti-virus programs
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
ransomware
Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .
sniffers or sniffer
Specialized hardware or software that capture packets transmitted over a network are called packet _________.
Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications.
Which of the following three statements are true regarding keystroke loggers?
Includes the collection of keystrokes, passwords, and confidential information Collects information about your Internet surfing habits and behaviors. Installed via free downloads or by visiting certain illegitimate websites.
Which three of the following statements are true about spyware?
Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.
Which two of the following can help prevent a virus infection?
zombie, botnet, or bot net
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _________. An army of these are used to launch denial of service (DoS) attacks.
Button 4
Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?
Settings
When you open the options tab in Firefox, after you select the menu button, where would you click to adjust cookie settings?
virus
Software that infects computers and is created using computer code is called a computer _____.
Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls.
Which of the following three statements are true about Trojan malware?
Put the following steps of a virus infection in the correct order.
1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus 3. The payload is activated and the virus starts its destructive actions.
Distributed Denial of Service
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
keystroke
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.
programs
Adware often accompanies downloaded _____.
Visiting a contaminated website Opening an infected e-mail attachment Downloading an infected file from the Internet
Computer viruses can infect a digital device in which three of the following ways?
OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads
Computers infected with a virus exhibit many symptoms including which three of the following?
e-mail virus
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
hacker
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.
adware
Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called __________.
Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.
Select two true statements about packet sniffers.
Ways to avoid a computer virus
Adjust your web browser's security settings to allow browsing only on trusted sites. Surf the web and download content safely.
making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.
There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
The 3-dot "Settings and more" icon
To adjust cookies in Edge, where would you click first?
Server Router Computer
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?