CGS Computer security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

dentify what is true about script kiddies.

Script kiddies illegally gain access to computer systems using programs (scripts) other have written and are usually amateur computer hackers with little programming expertise.

Which of the following are online annoyances?

Spam, spyware, and spoofing are online nuisances.

Common malware types include

Trojan horses, worms, and viruses.

Sometimes spam messages are referred to as ________.

UBE

Websites that use cookies can collect information about

Websites that use cookies can collect information about a user's surfing habits, monitor web behavior, and sell that information to third parties.

f you believe you have fallen victim to a phishing scam, which two should you do right away?

contact US-CERT and contact the institution the message was allegedly sent from.

The malevolent use of computer code to change a computer or network's normal operations is called a ________.

cyberattack

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullling

Which of these would be deemed a cybercrime?

data manipulation

Specialized hardware or software that capture packets transmitted over a network are called packet ________.

sniffers

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP adress

Which of these would be considered a cybercrime?

Internet scams, cyber espionage, and information theft are all considered cybercrimes.

A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.

cyberterriost

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.

pharming

Rootkits enable a remote user to do which of the following?

expect for install drivers

A virus signature is the software ________ of a particular computer virus.

code

Put the steps of a virus infection in the correct order.

1) The virus arrives via e-mail attachment, file download, or by visiting an infected site 2)An action such as running or opening the file triggers the virus. 3)The infection is spread to other devices or a network. 4)The payload is activated and the virus starts its destructive actions.

What order of steps should you take to change your cookie preferences in Safari?

1) choose safari 2) click preferences 3) click privacy 4) change cookie settings

Avoiding viruses include all the following except

bypass your browser's built-in security.

Breaking into a computer system (hacking), for politically or socially purposes is called ________.

hacktivism

Malware is designed to do all the following except

improve data

In each browser's settings area you should consider ________, ________, and ________.

other than adjusting your firewall settings

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.

persistent

Cookies stored on a computer store information about ________.

user preferences

Software that infects a computer and is created by computer code is called a ________.

virus

A damaging program duplicating itself on a single computer or over a network is called a ________.

worm

Which of the following are treated as cybercrimes?

-data manipulation -cyberbullying -data corruption

What is true of the malware Trojan horse?

-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls

What is the best way (order of steps) to customize cookie settings?

1)Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2)Tap or click the Tools button Tools, and then tap or click Internet options. Tap or click the Tools button Tools, and then tap or click Internet options. 3)On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default.

Firewalls help protect against ________ and ________.

Firewalls help protect against worms and hackers.

Cyberattacks include the following

Cyberattacks include spyware, pharming, phishing, spamming, spoofing, DoS, and DDoS attacks to name a few.

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.

DDoS

The acronym DDoS stands for ________.

Distributed Denial of Service

Factors that damage computer hardware include?

Factors that damage computer hardware include magnetic fields, humidity, power surges, and overheating.

In the Firefox, the best steps to clear the browser cookies is to

1)Click the Menu button, choose History, and then Clear Recent History. 2)Once you have cleared recent History you should set the time range to clear Everything. 3)Click on the arrow next to Details to expand list of History items. 4)Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.


Ensembles d'études connexes

Torah Bowl Championship Meet April 2022 Section 3

View Set

Module 5 Advanced Diagnostics/ Sonography/Imaging

View Set

CS 302 SORTING ALGORITHMS FINAL EXAM

View Set

unit 8 vocabulary - true or false

View Set

Chapter 6 Life in the Industrial Age

View Set

Qu'est-ce que tu fais en général pendant les vacances?

View Set

Consilience: The Unity of Knowledge

View Set

Maternal-Neonatal Nursing - Intrapartum Period

View Set