security
a crime in which a computer is the object of the crime or is used to commit a criminal or offense is called ___
Cybercrime
Which of the following are ways to prevent computer virus infections?
Downloaded content from the web should only be from trusted sites Web surfing should be limited to trusted sites Install the latest antivirus software and update frequently
Adware often accompanies downloaded
Programs
Common types of malware include
Viruses, Trojans, Worms
the software code of a particular computer is called the virus ____
signature
On a MacIntosh home screen, where do you click to access to adjust parental control settings.
Apple, Settings
Select what is true about persistent cookies
Collect information about the IP Address Collect password and username information Collect information about user preference
a deliberate misuse of computers and networks, ___ use malicious code to modify the normal operations of a computer or network.
Cyberattacks
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a ___
Hacker
Select what is true about packet sniffers
Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information
Experts suggest using a password ___ software to keep your passwords safe.
Management
Select what is true about passwords
Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password
Which of the following describes phishing
Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con users into giving up private information
Typically computer viruses must be ___ to attack and do damage to a digital device
Run
Computer software that Is designed to prevent spam messages from entering into a user's email inbox is called a ___ filter
Spam
which of the following are online nuisances?
Spoofing, Spyware, Spam
software that collects information about your Internet surfing habits and behaviors is called
Spyware
According to the FTC a few US internet privacy laws/rules of importance are:
The red flag rule, COPPA
The titles in the DMCA that directly impact digital copyright issues are
Title 2 Title 1 Title 3
The main government organization that oversees internet privacy in the United States in the Federal ___ Commission
Trade
which of the following are protected by intellectual property laws against unauthorized use or distribution
Video games Movies
Select what is true about worms
Automatically reproduce itself
Which of the following are considered e-commerce transactions?
B2B, B2C, C2C
Software that collect a user's web browsing history to create unsolicited targeted pop-up advertisements is called ___
Adware
One version of this malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This malware is called ___
Ransomware
Software programs that hide in the operating system and allow for the installation of hidden files are called ___
Rootkits
What type of cookie is stored in temporary memory and is lost when the web browser is closed
Session
antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are
Signature-based detection Heuristic-based detection
Select what's true about Trojan malware
Similar to viruses, but to not replicate themselves Often used to find passwords, destroy data, or bypass firewalls Often found attached to free downloads and apps
Specialized hardware or software that capture packets transmitted over a network are called packet ___
Sniffers
Select what is true regarding keystroke loggers.
Software based keystroke loggers are often a Trojan that is installed without the user's knowledge Can be hardware devices and software applications Keystroke loggers can record passwords and confidential information.