computer concepts exam
Safari accepts cookies and website data from which of the following?
Only from websites you visit
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ____
cyberattack
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is
hacktivism
Human knowledge and ideas that the law protects against unauthorized use by others is considered ______ property
intellectual
Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.
persistent
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
Select three privacy risks associated with cookies.
- Corporate and government entities can track your web behavior. - Websites can track your surfing behavior and create a profile. - Websites using cookies can collect your information and sell it to third parties.
Which three of the following you should consider in the settings area of each browser?
- Deleting cookies - Blocking or customizing your cookie settings - Decide from which sites you want to allow cookies
three functions of session cookies
- Determine the start and end of a session. - Analyze and measure traffic on a web page. - Determine the web browser being used.
The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.
NAT (Network Address Translation)
First-party cookie
Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.
cybercrime
A type of malware that is triggered each time you boot your computer is called a ____---
rootkit
Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ________ kiddies
script
Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page.
session
The software code of a particular computer virus is called the virus _________.
signature
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber
terrorist
Persistent cookies store information about which two of the following?
user preferences, password and username information
Which three of the following settings can you restrict in the Mac OS?
- Which apps the user can access - Restrict user's access to other people through Game Center, Mail, and Messages - Limit access to specific websites
You can change your Firefox settings to allow you to do which three of the following?
- approve cookies storage requests. - delete stored cookies automatically when you start Firefox. - deny cookie storage requests.
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network _________ Translation provides a type of firewall protection by hiding internal IP addresses
address
If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.
false
Third-party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
Web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk
On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?
advanced
Harming or harassing via information technology and networks in a repeated and deliberate manner is called _____
cyber bullying
International laws on Internet privacy are very similar.
false
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
A virus written in a specific language and placed within a document or spreadsheet is called a _______ virus
macro
Software that illicitly collects information about your Internet surfing habits and behaviors is called________
spyware
In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?
open the advanced menu
Specialized hardware or software that capture packets transmitted over a network are called packet __________-
sniffer
One of the risks with cookies is ___.
websites using cookies can collect your information and sell it to third parties