CGS2060 Ch. 5: Computer Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a what?

Cookie

A deliberate misuse of computers and networks using malicious code to modify the normal operations of a computer or network is called a what?

Cyberattack

What does DDoS stand for?

Distributed Denial of Service

A form of spyware that records all actions typed on a keyboard is called a what?

Keystroke logger

When this is activated, it saves all keystrokes for subsequent transmission to the virus creator.

Keystroke logging Trojan

A virus that is written in a macro language and placed within a document or a spreadsheet is called a what?

Macro virus

This was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the internet, providing a type of firewall protection by hiding internal IP addresses.

Network Address Translation (NAT)

Do Trojans replicate themselves?

No

Annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money (i.e. spam, spyware, phishing/pharming, trolling/spoofing) are called what?

Online nuisances

Specialized hardware or software that captures packets transmitted over a network are called what?

Packet Sniffers

This element of a firewall inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules.

Packet filter

These are stored on the hard drive and are not lost when the browser is closed, and collect info about user preferences, username and password info, IP addresses, and web surfing behavior.

Persistent Cookies

A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer, redirecting the user to a phony web page, is called what?

Pharming

This process tricks users into revealing usernames and passwords by appearing legitimate.

Phishing

This element of a firewall intercepts all messages between a client and server and helps avert a hacker or other intruder from attacking a network.

Proxy server

If antivirus software cannot remove a found virus, it will send the file to an isolated area on the hard drive called a what?

Quarantine

When this is activated, it encrypts files on a user hard drive and then sells a decryption program.

Ransomware

This type of malware hides in the operating system, and is triggered each time you boot your computer.

Rootkit

Computer viruses typically must be _____ to attack and do damage.

Run

This term describes individuals who try to illegally gain access to computer systems using programs that others have written, as they lack the skill to write their own.

Script Kiddies

Files that are stored in temporary memory and are lost when the web browser is closed that collect info about the start and end of a browsing session, analyze and measure web traffic, and determine the browser being used are called what?

Session cookies

What are the two common types of cybercrimes?

Single event, on-going series of events

An unsolicited email message, sometimes called UBE (unsolicited bulk email), is called what?

Spam

Software that collects information about your Internet surfing habits and behaviors, including keystrokes, passwords, and confidential information, is called what?

Spyware

A program that appears to be legitimate but executes an unwanted activity when activated is called a what?

Trojan horse

If you receive a phishing message, you should report the incident to what organization?

US-CERT

The software code of a particular virus, detected by an antivirus software's database, is called a what?

Virus signature

These individuals are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against intrusions.

White Hat Hackers

A destructive program that replicates itself throughout a single computer or network is called a what?

Worm

Do worms attack both wired and wireless networks?

Yes

Software that collects the user's web browsing history and subsequently creates unsolicited pop-up advertisements is called what?

Adware

Opening an infected email attachment, downloading an infected file from the internet, sharing infected files, or visiting a contaminated website are all ways to contract a what?

Computer virus

Software that infects computers and is created using computer code is called a what?

Computer virus

Harming or harassing a person or group via information technology and networks in a repeated, deliberate manner is called what?

Cyberbullying

Criminal activity committed within a computer, including cyberespionage, information theft, data manipulation, cyberbullying, and data corruption is collectively called what?

Cybercrime

Cyberbullying is also known as what?

Cyberstalking

A ______ uses computers and the internet to launch attacks against computer systems for political or ideological reasons.

Cyberterrorist

A ____ attack launches viruses on computers, causing them to act as zombies and work together to send out legitimate messages, creating huge volumes of network traffic resulting in a crash.

DDoS

What does DoS stand for?

Denial of Service

A _____ is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

DoS

In order to maximize security, NAT should be used in conjunction with the router or OS's what?

Firewall

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a what?

Hacker

Malware is short for what?

Malicious software

This is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user.

Malware

Name 3 types of malware.

Viruses, worms, Trojan horses

These destructive programs exhaust network bandwidth or available storage through replication.

Worms


Ensembles d'études connexes

Computer Science Final - All Multiple Choice

View Set

Table 48-7 (Drug therapy diabetes)

View Set

Software Design and Programming Basics

View Set

Lesson 11 - PS 3a: Central Tendency (Engl. Terminology)

View Set