cgs2100 chapter 1 quiz
whats true about worms
-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email notifs
which of the following are cookie settings you can adjust in internet explorer
-block -allow -delete
select what's true about session cookies
-determine the start and end of a session -analyze and measure traffic on a web page -determine the web browser being used
which of the following are considered cybercrimes?
-internet scams -cyberespionage -information theft
whats true about trojan malware
-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewall
which of the following are common email viruses
-ransomware -keystroke logging
common types of malware include
-viruses -worms -trojan horses
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDos
a DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym for DDoS stands for
Distributed Denial of Service
spam messages are sometimes referred to as
UBE
which of the following would be considered a cybercrime?
data manipulation
firewall software used to block a user's access to specific internet content is called ___ filter
internet filter
cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent cookies
specialized hardware or software that capture packets transmitted over a network are called packet
sniffers
you must individually adjust cookie settings in every browser you use
true
a destructive program that replicates itself throughout a single computer or across a network is called a
worm
identify whats true about script kiddies
-amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written