CIS-computer security
Experts suggest using password ____ software to keep your passwords safe
management
Select what is true regarding keystroke loggers
-keystroke loggers can record passwords and confidential information -can be hardware devices and software applications -software based keystroke loggers are often a trojan that is installed without the user's knowledge
Which of the following can help prevent a virus infection?
-never bypass your browser's built-in security features -adjust your web browser's security settings to allow browsing only on trusted sites
Put the steps in order for turning on parental controls in microsoft windows in order
1. Open parental controls 2. Click the standard user account that you want to use to set parental controls for 3. Under parental controls click "on" then enforce current settings 4. Adjust time limits, access to specific programs, access to specific websites
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Third-party cookie
small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ____.
Cyberattack
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.
Trojan horse
Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services
UBE
A destructive program that replicates itself throughout a single computer or across a network is called a ____.
Worm
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cybercrime
Retpoline, a strategy to mitigate the meltdown and spectre vulnerabilities, was developed by the project zero labs at ____, a company better known for its search engine and its pixel 2 smartphone
If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in _____ mood
safe
First-party cookie
small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Web cookie
small text file of information created by websites you visit that your web browser stores on your hard disk
Initally, the united states computer emergency readiness team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processors
spectre, meltdown
Software that collects information about your internet surfing habits and behaviors is called ___.
spyware
Which of the following are symptoms of an online nuisance attack
-frequent pop-ups while searching the web or working in programs -receiving a lot of spam messages or bounced back email messages -pop up start appearing after you visit unfamilar sites
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:
Signature-based, heuristic-based
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ______.
cyberterrorist
select the privacy risks associated with cookies
-websites using cookies can collect your information and sell it to third parties -websites can track your surfing behavior and create a profile -corporate and government entities can track your web behavior
Which of the following are ways that computer viruses can infect a digital device ?
-opening an infected email attachment -downloading an infected file from the internet -visiting a contaminated website
Keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
Ransomware
when activated, encrypts files on user hard drive and then sells a decryption program
A computer controlled by a hacker is called a ____.
Zombie
Select whats true about spyware
-installed via free downloads or by visiting certain illegitimate websites -includes the collection of keystrokes, passwords, and confidential information -collects information about your internet surfing habbits
Select whats true about macro viruses
-commands in the macro language set off the destructive -when file is opened the macro virus executes -initiated by downloading and opening an infected attatchment
Rootkits are typically used to allow hackers to do which of the following
-encrypt files -install rouge files -create backdoors
According to US-CERT, if you recieve a phishing message, which of the following methods should use to report the issue?
-in outlook, you can create a new message and drag the phishing email into the new message. Send it to [email protected] -contact the via the phone number listed on the US-CERT site
Malware is designed to do which of the following
-incapacitate a computer or network -destroy data -steal information
A group of compromised computers controlled by a hacker is called a _____.
Botnet
Cyber attacks include
DDOS attacks Identity theft Pharming
Correctly identify the terms that are associated with hackers and online nuisances
HACKER: Cyberterrorist, Black hat, Script Kiddle, White hat ONLINE NUISANCES: Spam, adware, spyware
The technology that provides a type of firewall protection by hiding internal IP addresses is called ____.
NAT
Typically computer viruses must be _____ to attack and do damage to a digital device
Opened & run
Stored on a users hard drive, cookies that collect information aboht user preferences, passwords and username information, IP address, and data on web-surfing behavior are referred to as _____ cookies
Persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer and directs them to a fake webpage is called _______ .
Pharming
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as _____.
Pharming
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called
Ransomware
One version of this malware encrypts the victims data until a payment is made. Another version threatens to make public the victims personal data unless a payment is made. The malware is called ____.
Ransomware
a type of malware that is triggered each time you boot your computer is called a ____.
Rootkit
Stored in a temporary memory, ____ cookies are used to analyze and measure traffic on a webpage
Session
Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a _____ filter
Spam
Which of the following are online nuisances?
Spam Spyware Spoofing
A type of malware that replicates itself throughout a single computer or across a network is called a _____.
Worm
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.
Zombie
Developed by cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses
address
software that collects a user's web browsing history to create unsolicited targeted pop up ads is called ___.
adware
An internet filter is a firewall software used to block a users access to specific internet content. An internet filter can be installed on which of the following?
computer, server, router
Small text files created by websites you visit that your web browser stores on your hard disk is called ____.
cookies
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
Software programs that hide in the operating system and allow for the installation of hidden files are called ____.
rootkits
The software code of a particular computer virus is called the virus ____.
signature
Unsolicited email is _____.
spam
Phishing
tricks users into revealing usernames and passwords by appearing legitimate
Persistent cookies store information about
user preferences, password and username information
Common types of malware include
viruses, worms, trojan
The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ____.
Phishing