ITEC Security
is software that collects the user's web browsing history. This data is collected then used to create unsolicited targeted pop-up advertisements
Adware
is a small text file of information created by websites you visit that your web browser stores on your hard disk.
Cookies
are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.
White hat hacker
what is not true about worms. a)designed to attack only wired networks b)often sent using email attachments c)automatically reproduce d)replication exhausts network bandwidth or available storage
a
Software used to collect data to create unsolicited targeted pop-up advertisements is called _____
adware
a common symptom of a computer virus infection does not include a)a voice the speaks to you from the computer b)a pop-up advertisement c)a mouse that has run out of batteries d)a slow running machine
c
is a software that infects computers and is created using computer code
computer virus
A small text file of information created when you visit a website
cookie
The bad use of computer code to modify the normal operations of a computer is called a _______
cyber attack
A deliberate misuse of computers and networks via the internet
cyberattack
Harassing a person via information technology in a repeated and deliberate manner is called
cyberbullying
which is not considered a cyber-crime? a)identity theft b)cyber-espionage c)internet scams d)cyber monitoring
d
put the steps of a virus infection in the correct order a)the infection is spread to other devices or a network b)an action such as running or opening the file triggers the virus c)the payload is activated and the virus starts its destructive action d)arrives by an email attachment or visiting an infected site (type it in like a,d,b,c)
d,b,a,c
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner
cyberbullying
A crime in which a computer is the object of the crime or is used to commit a criminal or offense
cybercrime
Cyber attack include a)DDoS attacks and Spam mail b)identity theft and hardware theft c)Spam mail and Adware d)DDoS attacks and identity theft
d
If you believe you have fallen victim to a phishing scam you should contact US-CERT and __________ a)your ISP b)the police c)the US Post Office d)the institution the message was allegedly sent from
d
Which of the following is not considered a cyber-crime? a)data manipulation b)data corruption c)pop-up advertising d)cyberbullying
d
is a person who gains unauthorized access to networks.
hacker
The act of hacking for political or socially motivated purposes is called
hacktivism
A _____ records all actions typed on a keyboard.
keystoke logger
logger is a form of spyware that records all actions typed on a keyboard and can be hardware devices and software applications
keystroke logger
A virus that is written in a macro language and placed within a document or spreadsheet
macro virus
Is designed to steal information,destroy data,impact the operations of a computer or network or frustrate the user. is also short for malicious software
malware
Specialized hardware or software that captures packets.
packet sniffers
SPAM is
unsolicited email
DDOS stands for
Distributed Denial of Service
attack is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
Dos
is firewall software used to block a user's access to specific Internet content
Filter
is hardware or soft ware used to keep a computer secure from outside threats such as hackers and viruses.
Firewall
is the act of hacking, or breaking into a computer system for a politically or socially motivated purpose.
Hacktivism
Specialized hardware or software that capture packets transmitted over a network.
Packet sniffer
is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer.
Pharming
is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company.
Phishing
are would-be hackers who attempt to gain unauthorized access to networks and in order to steal and corrupt information and data.
Script kiddie
When an infected file is found to have a virus and cannot be removed it is moved to ??
quarantine
is malware that makes a computer's data inaccessible until a ransom is paid
ransomware
are software programs that hide in the operating system
rootkit
amateur computer hackers with little programming expertise who attempt to gain illegal access to a computer are called?
script kiddies
is software that collects information about your Internet surfing habits and behaviors.
spyware
Is a program that appears legitimate, but executes and unwanted activity when activated
trojan
An email that appears to be legit but has a virus inside,
trojan horse
A group of compromised computers controlled by a hacker is called a botnet. (true or false)
true
software that infects a computer and is created using computer code is called a computer ______?
virus
Non-malicious computer security experts that test a network
white hat hacker
A destructive program that replicates itself throughout a single a single computer or a network is a
worm
a destructive program that replicates itself throughout a single computer or across a network
worm
Your computer has been attacked and overtaken by a hacker. Your computer is known as a ________ computer
zombie
s a computer that has been secretly taken over by an outsider,typically using a rootkit, and subsequently programmed to perform a variety of damaging tasks.
zombie