Ch. 5 Security - Adaptive Learning Assignment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

Select three true statements regarding persistent cookies.

Collect information about the Internet protocol (IP) Address. Collect password and username information. Collect information about user preferences.

Rootkits are typically used to allow hackers to do which three of the following?

Create backdoors Encrypt files Install rogue files

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

Which three of the following you should consider in the settings area of each browser?

Decide from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Ways to catch a computer virus

Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___

Email

Which three of the following may be indications that your system has been hacked?

Fake e-mails or social media messages in your account Redirected Internet searches Unwanted browser toolbars

International laws on Internet privacy are very similar.

False because International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

Which of the following are symptoms of an online nuisance attack?

Frequent pop-ups while searching the web or working in programs Receiving a lot of spam messages or bounced back e-mail messages. Pop-up start appearing after you visit unfamiliar sites.

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at_________, a company better known for its search engine and its Pixel series smartphones.

Google

The DMCA (Digital Millennium Copyright Act) protects ___ from liability for copyright violations of its users.

ISPs

Which three of the following are ways to prevent computer virus infections?

Install the latest antivirus software and update frequently. Web surfing should be limited to trusted sites. Downloaded content from the web should only be from trusted sites.

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

Internet

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

Systems Procedures Processes

The main governmental organization that oversees Internet privacy in the United States is the Federal _______Commission.

Trade

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE or Unsolicited Bulk E-mail.

Which area of the Control Panel screen in Windows allows you to adjust Parental Controls?

User account

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

A ________ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

If you believe you have fallen victim to a phishing scam you should:

contact the institution the message was allegedly sent from contact US-CERT

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

An attack using a computer is a ___.

cyberattack

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

cyberterrorist

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

deleting cookies. blocking/allowing cookies by default. making exceptions for cookies from specific websites or domains.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ______of service attack.

distributed denial of service

Which component of a network designed to prevent unauthorized Internet intrusions?

firewall

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism or hacktivist

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

A virus written in a specific language and placed within a document or spreadsheet is called a ____virus.

macro

A virus written in a macro language and placed within a document or spreadsheet is called a _____ .

macro virus

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an____ nuisance.

online

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

phishing ransomware keystroke logging Trojan

Adware often accompanies downloaded _____.

programs Adware is software that collects the user's web browsing history and often accompanies downloaded apps and software programs.

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ________,a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffer

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a _____filter.

spam

Most e-mail applications, such as Gmail and Outlook, provide robust _______filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam or trojan virus

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

true

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers- are non-malicious computer security experts who test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Which of the following are online nuisances?

-spam -spyware -spoofing

You need to adjust cookie and data permission settings in Google Chrome. Put the following steps in the correct order for adjusting cookie and site data permission settings in Google Chrome.

1. click the chrome on the browser toolbar then select settings 2. click show advanced settings. In the Privacy section, click the content settings button 3. in the cookies section change the desired cookies setting

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.

Choose Safari Click Preferences Click privacy Change cookie settings

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Meltdown Spectre

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

First-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Video games Movies

Ways to catch a computer virus

Visiting questionable websites. Ways to catch a computer virus Opening suspicious or infected e-mail messages.

Which three of the following settings can you restrict in the Mac OS?

Which apps the user can access Limit access to specific websites Restrict user's access to other people through Game Center, Mail, and Messages

Internet privacy

Who has access to data and information, How data and information is used, Techniques and technologies used to protect sensitive data and information

A group of compromised computers controlled by a hacker is called a _____.

botnet

A type of malware that is triggered each time you boot your computer is called a

rootkit

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

Select three privacy risks associated with cookies.

Websites using cookies can collect your information and sell it to third parties. Websites can track your surfing behavior and create a profile. Corporate and government entities can track your web behavior.

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

You can change your Firefox settings to allow you to do which three of the following?

approve cookies storage requests. delete stored cookies automatically when you start Firefox. deny cookie storage requests.

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk:

Put the following steps of virus infection in the correct order.

The virus arrives via e-mail attachment, file download, or by visiting an infected site. An action such as running or opening the file triggers the virus The virus arrives via e-mail attachment, file download, or by visiting an infected site.

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Computers infected with a virus exhibit many symptoms including which three of the following?

Strange error messages or pop-up ads OS does not launch properly Files get deleted or encrypted

Ways to avoid a computer virus

Surf the web and download content safely. Adjust your web browser's security settings to allow browsing only on trusted sites.

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Server Computer

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

copyright

Digital identity

Online search activities, Purchasing behavior, Social media postings

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Where on the Mozilla Firefox screen would you click to delete cookies?

Open menu. You can adjust a variety of settings in this area including cookies.

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Which of the following are considered Intellectual property?

Patents Trademarks Trade secrets

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Tricks users into revealing usernames and passwords by appearing legitimate.

Phishing

To delete cookies in Safari, click ___.

Preferences

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

Contact the via the phone number listed on the US-CERT site. In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected].

Virus symptoms

Critical files are deleted automatically The operating system does not launch properly

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False because each browser is independent and requires that you adjust cookie settings in each one you use.


Ensembles d'études connexes

PNU 133 Honan PrepU Collaboration / Teamwork & Collaboration

View Set

FUNDS II Chapter 4. Nursing Process: Diagnosis

View Set

Health Online- GROWTH, DEVELOPMENT, AND SEXUAL HEALTH- Personal Hygiene and Health

View Set

Business Strategy Chapter 2: Charting a Company's Direction: Its vision, mission, objectives, and strategy

View Set

Chapter 37: Nursing Management: Patients With Immunodeficiency, HIV Infection, and AIDS

View Set

The 3-1: Obstructive Pulmonary Diseases

View Set

Network+ Questions that i got wrong

View Set