Security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

only websites you visit

Safari accepts cookies and website data from which of the following?

virus

cannot boot computer running slower than newer

white hat

computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called _____ hackers

digital identity

personal data such as your social security # and birth date usernames/passwords online search activities

black hat

A _________ hacker breaks into computer systems with the intent of causing damage or stealing data

Zombie

A computer that is controlled by a hacker is called

cyberattack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is

adjusting cookie settings

choose safari click preferences click privacy change settings

true about passwords

the terms passcode and key are synonymous for password passwords can be used to secure computers, networksm software, personal accounts, and digital devices

spam filter

computer software that is designed to prevent spam messages from entering into a user's email inbox is called

firewalls

helps protect against worms and hackers

cyberattacks include

identity theft, pharming, DDoS attacks

Phishing

illegitimate use of an email message that is sent to collect personal info and appears to be from an established organization such as a bank, financial institution, or insurance company is

single event

phising, trojan horse, keystroke logger

Digital Identity

social media postings online search activities purchasing behavior

online nuisances

spyware, adware,lots of spam, frequent pop ups

B2C

the process in which businesses sell to consumers

C2C

the process in which consumers sell to other consumers

cyberattacks

A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network

Computer, router, server

An internet filter can be installed on which of the following?

internet

the right of personal privacy concerning the storing, distributing and displaying info concerning oneself via the internet is ____ privacy

virus signature

the software code of a particular computer virus is called the

run

Typically computer virsuses must be ______ to attack and do damage to a digital device

Hacker

black hat, cyberterrorist,white hat, script kiddle

games, movies

which of the following are protected by intellectual property laws against unauthorized use or distribution?

internet privacy

who has access to data and info how data and info is used tech used to protect sensitive data and information

Internet filter

Firewall software used to block a user's access to specific internet content is called am

sniffers

Specialized hardware or software that capture packets transmitted over a network are called packet

C2C

a consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist

on-going series of events

blackmail, cyberstalking

how you should handle your cookies

blocking/customizing deleting cookies allow cookies from trusted sites

google chrome cookie settings include

deleting cookies blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains

common symptoms of a computer virus

documents won't save programs launch on their own

Management

experts suggest using password _____ software to keep your passwords safe

how to block firefox cookies from a website

go to website right click and select view page select permissions underneath set cookies

other computer term

hardware theft, software theft

incorrect

one of the positives of free anti-virus software is their spam detection performance

Spyware includes the collection of

passwords, account numbers,keystrokes

web cookie

small text file of information created by websites you visit that your web browser stores on your hard disk

NAT

the tech that provides a type of firewall protection by hiding internal IP addresses is called

macro virus

A virus written in a specific language and placed withing a document or spreadsheet is called

COPPA, the red flag rule

According to the FTC a few U.S internet privacy laws/rules of importance are

run

computer viruses typically must be _____ to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network

internet

International laws on ______ privacy vary greatly.

first-party cookie

small text file of info created by a website you visit that keeps track of your personal preferences and the current web browsing session

general

After clicking internet options what do you click next to delete cookies in explorer?

true

Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

70

Copyright works will pass into public domain ___ years after the death of the creator

Distributed Denial of service

DDoS attack stands for

address

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network ____ translation provides a type of firewall protection by hiding internal IP addresses.

Hacktivism

Hacking computer systems for a politically or socially motivated purposes is called _____

quarantine

If the software can't remove the infected file it will send the file to an isolated area on the hard disk called

safe

If you notice you are recieving fake antivirus messages, power down your computer and reboot your computer in _____ mode

Internet Explorer icon

If you want to delete cookies in explorer you should click the _____

script kiddies

Illegally gain access to computer systems using programs that others have written, Amateur computer hackers with little programming expertise

Privacy

In Mozilla firefox where would you click to adjust cookie settings

true about packet sniffers

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

malicious software

Malware stands for

popular password management apps

Norton,Dash, Last pass

Trojan

Often accompanying downloaded music or apps, programs that appear to be legitimate but executes an unwanted activity when activated is

ransomware

One version of this malware encrypts a victim's data until a payment is made. Another threatens to make public the victim's personal data unless a payment is made this is called

RFID

Passports issued by the U.S and many other countries include ____ Chips.

virus

Sharing infected files and opening an infected email attachment are ways that a computer ____ can infect a digital device.

digital

Signed into law by president Clinton in 1998, the _____ Millennium copyright act implements two world intellectual property organization treaties

true

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars

Rootkits

Software programs that hide in the operating system and allow for the installation of hidden files are called

spyware

Software that collects info about yout internet surfing habits and behaviors is called

virus

Software that infects computers and is created using computer code is called a computer

property

The DMCA act implements two world intellectual _____ organization treaties

Trans-Pacific Partnership

The TPP stands for

Canada, Brunei, U.S

The TPP was negotiated by 12 countries including:

trade

The main governmental organization that oversees internet privacy in the united states is the federal _____ commission

Title 2,1,3

The titles in the DMCA that directly impact digital copyright issues are

40

The tpp covers just under __ % of global GDP

state

These laws are created by both _____ and federal gov't

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

proxy

What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

internet options

Where should you click to delete cookies from explorer after opening the tool button

data corruption/theft, cyberbullying

Which of the following are considered cybercrimes?

allow,block and delete

Which of the following are cookie settings you can adjust in internet explorer

d

Which of the following are steps of how a virus infects a computer? a)copying itself b)running/opening files activates the virus c)arrives via email, download, visiting an infected site d)all the abober

B2C

a consumer makes a purchase from overstock.dom

hacker

a person who gains unauthorized access to networks and in order to steal and corrupt information and data is a

password

a secret code used to help prevent unauthorized access to data and user accounts is called a

email

a virus that is attached in a file in and sent via email message is called a ____ virus

copies

a worm is a type of malware that _____ itself throughout a single computer or across a network

programs

adware often accompanies downloaded

rootkits

allow remote users to create backdoors, delete files, and install rogue files

dos attack

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a

true about Ergonomics

an important element of workplace safety, derived from the Greek words ergon and nomoi, the study of human interaction with the objects they use.

how to remove cookies from safari

click-remove all website data, or click details then select one or more websites then click remove

functions of session cookies

determine the start and end of a session determine the web browser being used

cyberattack

dos attack, packet analyzer,rootkit

internet

firewall software used to block a user's access to specific internet content is called

true

if you adjust your cookie settings in chrome your cookie settings in firefox are automatically adjusted to match those of chrome

true about macro viruses

initiated by downloading and opening an infected attachment commands in the macro language set off the destructive events when file is opened the macro virus executes

virus

macro, trojan, worm

Ransomware

malware that encrypts victims' data files and demands payment for a decryption code

online nuisances

phishing, spoofing, trolling, spyware

true about trojan malware

similar to viruses(doesn't replicate) often used to find passwords, destroy data, or to bypass firewalls attached to free downloads and apps

third-party cookie

small text file of info created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

spam filter

software designed to prevent spam messages from entering his email inbox.

malware is for

steal info destroy data incapacitate a computer or network

session

stored in temporary memory, ____ cookies are used to analyze and measure traffic on a web page

persistent

stored on a user's hard drive, a type of cookie that collects info about user preferences, password/username info, ip address, and data on web surfing behavior is referred to as a _____ cookie

security

two of the main concerns that surrond digital identity are privacy and ______

Rootkit

type of malware that is triggered each time you boot your computer is called a _____

pharming

type of phising that seeks to obtain personal info through malicious software that is inserted on victims' computers and directs them to a fake webpage is

proxy servers, packet filters

typical firewall programs or hardware devices filter all info coming through the internet to your network or computer system

spam

unsolicited email is

Persistent cookies store information about

user preferences and password/username info

one of the risks of cookies

websites using cookies can collect your info and sell it to third parties

automatically reproduces itself

what is true abort worms?

privacy

which tab should you click to block cookies in internet explorer?

common types of malware

worms, Trojans, viruses

B2B

Alberstson's grocery store places an automated order for more Mountain dew from Pepsico via the internet

copyright

A form of protection provided by the laws of the United States for "original works of authorship"

keystroke

A form of spyware that records all actions typed on a keyboard is called a _______ logger

script kiddie

A hacker with little programming expertise who uses programs that other have written in an attempt to access networks

cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.


Kaugnay na mga set ng pag-aaral

Unit 12-Other Securities Products

View Set

Chapter 2 - Nature and Formation of a Partnership

View Set

Computer Science HTML Study Guide

View Set