INFO 160 chapter 9
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
logical ports
The term _____ refers to malicious software, such as viruses, adware and spyware
malware
is software that has a malicious intent.
malware
packet filtering
method for selectively allowing certain requests to access a port
these are all important protective measures for preventing viruses EXCEPT ________.
not using wi-fi hotspot
Emptying the Recycle Bin should be done ________.
only after you have determined that you no longer need any of the files that you have deleted
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
packet filter
A(n) ________ is a program that analyzes the contents of data packets on a network.
packet sniffer
A firewall designed specifically for home networks is called a ________ firewall.
personal
____ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
pharming
Which of the following virus types changes its own code to avoid detection?
polymorphic
____ are new browser windows launched by a website.
popups
Adware displays promotional items on user computers.
true
pop-up blocker
utility to stop extra Internet browser windows from opening
The following are basic functions that adware and spyware generally perform EXCEPT ________.
virus protection
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
white-hat hacker
All of the following are TRUE of virus protection software packages EXCEPT ________.
you can only scan the entire computer each time you perform a scan
ShieldsUP and LeakTest are software programs you can use to test whether ________.
your firewall is working correctly
________ floods a computer with requests until it shuts down denying access to legitimate users.
A DoS attack
zombie
a computer controlled by a hacker
packet sniffer
a program that examines the contents of all network traffic
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a trojan horse
polymorphic virus
a virus that changes its own code to avoid detection
An unusual advertisement on your computer screen that pops up is usually caused by ________.
adware or spyware
If you regularly use a program which uses useful pop-ups, you can ____ them for that site in Internet properties Pop-up blocker settings
allow
restore point
an exact copy of your hard drive
Trojan Horse
appears to be useful but does something malicious in the background
multipartite virus
attempts to infect computers through multiple methods
worm
attempts to travel between systems through network connections to spread an infection
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) _____ program.
backdoor/rootkit
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.
black-hat hacker
A large group of software programs that runs autonomously on zombie computers is called a(n) ___
botnet
adware & spyware
can perform some types of tracking, such as recording your surfing habits
Backing your work up to a(n) ________ is more secure than using an external hard drive.
cloud storage location
the most common occurrence of identity compromise is through ________.
data breaches of a company that stores your information
The practice of advertisers using software that gathers personal information about you is called ________.
data mining
All of the following pose a threat to your computer EXCEPT ________.
defensive computing
You would use Windows Action Center to check all of the following EXCEPT ________.
display settings
Attacks that are launched from multiple zombie computers at the same time are called ________.
distributed denial-of-service attacks (DDoS)
backup
duplicates files and programs on your hard drive
The desktop version of ____ has an option to turn its popup blocker off and on.
edge
A backdoor program is an app that appears to be useful to you, but does something malicious.
false
A keystroke logger allows hackers to take control of your computer.
false
All pop-ups are malicious.
false
When you delete files from your hard drive in Windows, they are permanently removed from your computer
false
Windows Action Center can only be used to troubleshoot computer problems.
false
Windows Defender is an add-on antivirus software package available as a subscription.
false
A good way to keep hackers out of a computer is to install a(n)
firewall
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.
first name
data mining
gathers personal information about you
botnet
group of software programs that usually run independently on a large number of zombie computers
Anyone who breaks into a computer system is known as a
hacker
firewall
hardware or software for protecting computers from hackers prevents intrusion into your computer
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.
identity theft
is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
identity theft
antivirus program
prevents unwanted, malicious programs from being installed on your computer
Setting a system restore point should be done ________.
prior to installing new software
packet sniffer
program used by hackers to look at individual packets as they travel on the Internet
Keystroke Logger
records everything you type, like credit card numbers
When you delete a file in Windows, it is actually stored in the _____ where you have a second chance to decide if you still need the file.
recycle bin
If you inadvertently delete a needed file from your computer's Documents folder, in Windows, you can recover it by ________
restoring it from the recycle bin
system restore
returns your computer settings to a previous point in time
tries to convince you that your computer is infected.
scareware
You may do great harm to your computer by doing any of the following, EXCEPT ________.
scheduling regular virus scans
A virus hidden in a website is known as a(n) ________,
script
____ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
scripts
packet
small piece of data that travels through the Internet
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.
sniffers
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ______ virus.
stealth
A(n) ____ backup creates an exact copy of an entire internal hard drive on an external hard drive.
system image
network address translation
technique of assigning hidden internal IP addresses to protect a network against hackers
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n)
trojan horse
A(n) _____ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
trojan horse
Backdoor programs and zombies are used to launch denial-of-service attacks.
true
Computer threats can come from your behavior as well as from outsiders or hackers.
true
Malware can be prevented by using antimalware software.
true
Modern virus protection software packages are easy to use.
true
You can help keep your system safe by keeping your apps and operating system updated.
true
You can set Windows to update automatically at certain intervals such as daily or weekly.
true
Windows Defender protects your computer from all of the following EXCEPT ________.
unexpected software updates
security patch
update code provided by software vendor
Which of the following are considered slightly different from viruses because they can run without user interaction?
worms
Which of the following statements is NOT true about identity theft?
Thieves can easily defeat 2-factor authentication.
Which is NOT a feature of security software?
Keystroke logging
aggressive advertising
Correct answer displaying enticing information to tempt you to buy
If you encounter a problem, the Windows ________ feature can take your system back in time to a point where it was working properly.
System restore