Chapter 5 Connect

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Identify common symptoms of a computer virus.

-Documents won't save -Computer runs extremely slowly -Programs launch on their own

Select what's true about packet sniffers

-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information. Packet sniffers use viruses to capture data packets

Which of the following are online nuisances?

-spam -spyware -spoofing

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.

Choose Safari Click Preferences Click Privacy Change cookie settings.

According to US-CERT if you receive a phishing message you should contact them using which of the following methods.

In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to phishing- report@us-cert. gov and send it. In Outlook Express you can also open the emial message and selecct File> Proprties> Details.

Which of the following are considered cybercrimes?

Internet scams Information theft cyberespionage

Which of the following are ways to prevent computer virus infections.

Limit your web surfing to trusted sites. Install the latest antivirus software and update it frequently.

A program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus.

Trojan

Spam messages are sometimes referred to as ___.

UBE

Select what's true about the privacy risks with cookies.

Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior.

A group of compromised computers controlled by a hacker is called a _____.

botnet

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

confidential information passwords

The malicious use of computer code to modify the normal operations of a computer or network is called a ______.

cyberattack

Common symptoms of a computer virus infection include

files get deleted or encrypted strange error messages or pop up ads OS doesn't launch properly.

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

hacktivism

Cyberattacks include

identity theft DDoS attacks

identify what's true about script kiddies.

illegally gain access to computer systems using programs (scripts) that others have written, amateur computer hackers with little programming expertise.

A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.

macro

Two common categories of cybercrimes include single events and _____ series of events.

on-going

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Select what's true about worms.

replication exhausts network bandwidth or available storage often sent using email attachments. automatically reproduce.

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________

script kiddies

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

An unsolicited email message is called ____.

spam

Software that collects information about your internet surfing habits and behaviors is called

spyware

Persistent cookies store information about

user preferences

Software that infects a computer and is created using computer code is called a computer _____.

virus

Non-malicious computer security expert that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hakers

white hat

A destructive program that replicates itself throughout a single computer or across a network is called a

worm

A computer controlled by a hacker is called a

zombie

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan horse

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

A ____ hat hacker breaks into computer systems with the intent of causing damage or stealing data

black

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Select what's true about session cookies.

Area stored on the computer's hard drive -Analyze and measure traffic on a web page. -Determine the web browser being used.

According to Mozilla, one of the most efficient ways to clear cookies in Firefox is:

Click the menu button, choose History, and then Clear Recent History. Once you have cleared recent history you should set the time range to clear Everything. Click on the arrow next to Details to expand list of history items Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Select what's true about Trojan malware.

-often found attached to free downloads and apps similar to adware often used to find passwords, destroy data, or to bypass firewalls

Which of the following are common email viruses.

-ransomware -keystroke logging Trojan adware

You must individually adjust cookie settings in every browser you use.

True

You can change your Firefox settings to allow you to

approve cookie storage requests delete stored cookies automatically when you start Firefox. deny cookie storage requests.

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ______.

cyberterrorist

Rootkits allow a remote user to do which of the following.

install rogue files create backdoor programs install drivers

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called _____.

phishing

Cookies that are held in temporary memory and used to analyze and measure traffic on a Web page are called ___ cookies.

session

Common types of malware include ______.

virus, worm, and trojan horse

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cybercrime

Which of the following could be considered a cybercrime?

data manipulation

What are more examples of cybercrimes?

data manipulation data corruption cyberbullying

If you believe you have fallen victim to a phishing scam you should

contact the institution the message was allegedly sent from contact US-CERT contact your ISP

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

zombie

Which of the following are cookie settings you can adjust in Internet Explorer ( Microsoft Edge).

delete cookies block cookies allow cookies

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

In the settings area of each browser you should consider

blocking/customizing your cookie settings. decide from which sites you want to allow cookies. adjusting your firewall settings

A smal text file of information created by websites you visit that your web browser stores on your hard disk is called

cookie

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

According to Micorsoft, the most effcient order of steps to customize cookie setting is?

Open the desktop, and then tap or click the Internet Explorer Tap or click the Tools button Tools, and then tap or click Internet options. On the Privacy tab, do one or more of the following: to set what types of cookies are blocked or allowed, move the slider. When you're done making changes, tap or click OK.

According to Microsoft, what is the correct order of steps for deleting cookies in Internet Explorer (Microsoft Edge)?

On the Start screen, tap or click Internet Explorer to open Internet Explorer. Swipe in from the right edge of the screen and then tap Settings. ( If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Setting. Tap or click Options, and then, under History, tap or click Select Select the Cookies check box, then tap or click Delete.

There are a variety of cookie settings that can be adjusted in Google Chrome including

blocking/allowing cookies by default making exceptions for cookies from specific websites or domains. deleting cookies

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____.

adware

Put the steps of a virus infection in the correct order

The virus arrives via Email attachment, file download, or by visiting an infected site An action such as running or opening the file triggers the virus The infection is spread to other devices or a network The payload is activated and the virus starts its destructive actions.


Ensembles d'études connexes

Week 07 Part 02: The Path to Commitment: Attraction, Dating, Partnering, and Cohabitation

View Set

305 mobility practice questions for final

View Set

Comfort nclex questions/ oxygenation

View Set

NSG 230: Nursing Today: Chapter 5

View Set

Exam 8 Ch.31-34 EMT Eleventh Edition

View Set

Chapter 8 - Sales and Operations Planning

View Set

Chapter 10 Structural Search and Rescue

View Set