Computer Security
To adjust cookies in Edge, where would you click first?
The 3-dot "Settings and more" icon
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber
terrorist
Software that infects computers and is created using computer code is called a computer _____.
virus
One of the risks with cookies is ___.
websites using cookies can collect your information and sell it to third parties
Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called ___ hat hackers.
white
Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.
white hat hackers
A destructive program that replicates itself throughout a single computer or across a network is called a __.
worm
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___ _. An army of these are used to launch denial of service (DoS) attacks.
zombie
Put the following steps in the correct order for turning on Parental Controls in Microsoft Windows.
1. open 2. click 3. under 4. adjust
Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.
1. safari 2. preferences 3. privacy 4. change
Put the following steps in the correct order for setting restrictions in Mac OS X.
1. select system 2. click 3. select a user
Put the following steps in the correct order to set parental controls in Mac OS X.
1. select system 2. click 3. select a user 4. if
Put the following steps in the correct order for navigating to the Windows firewall area.
1. start 2. settings 3. update 4. windows
Which area of the Control Panel screen in Windows allows you to adjust Parental Controls?
3
On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?
Advanced
Select three privacy risks associated with cookies.
Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.
DDoS or DoS
Which three of the following are considered cybercrimes?
Data theft Intentional data corruption Cyberbullying
Heuristic and signature-based detection are two techniques used by ___ software.
antivirus
Often, to actually launch an attack on a computer, a virus must be opened and ___.
run
Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ___ kiddies.
script
Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.
script kiddie
Stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page.
session
The software code of a particular computer virus is called the virus
signature
This is the Control Panel in Windows. Which number would you click to adjust your firewall settings?
1
What type of hacker breaks into computer systems with the intent of causing damage or stealing data?
Black hat hacker
This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?
Button 4
After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?
Click Remove All Website Data, or click Details then select one or more websites, then click Remove.
Select three true statements regarding persistent cookies.
Collect password and username information. Collect information about the Internet protocol (IP) Address. Collect information about user preferences.
Which three of the following you should consider in the settings area of each browser?
Decide from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings
Select three functions of session cookies.
Determine the start and end of a session. Determine the web browser being used. Analyze and measure traffic on a web page.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Which two of the following are ways to safely download antivirus software?
Download the software from a trusted site like www.cnet.com Download the software from a known antivirus software vendor
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.
False
Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?
Fee-based antivirus software often provides more features than free anti-virus software.
Which component of a network designed to prevent unauthorized Internet intrusions?
Firewall
Cyberattacks include which three of the following?
Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network
To delete cookies in Safari, click ___.
Preferences
When you open the options tab in Firefox, where would you click to adjust cookie settings?
Privacy & Security
Which three of the following are factors to consider to help protect the hardware of your digital device?
Protecting a digital device from humidity Protecting a digital device from magnetic fields Protecting a digital device from overheating
What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?
Proxy
Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?
Proxy servers Packet filters
Which three of the following are well-known e-mail attacks?
Ransomware Phishing Keystroke-logging Trojan
Which 2 of the following statements are true about passwords?
Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. Check your accounts. Regularly check your accounts to ensure they have not been tampered with.
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.
Zombie
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.
address
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.
antivirus software
A ___ hat hacker breaks into computer systems with the intent of causing damage or stealing data.
black
There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
blocking/allowing cookies by default. making exceptions for cookies from specific websites or domains. deleting cookies.
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a
hacker
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.
hacker
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is
hacktivism
Hacking computer systems for politically or socially motivated purposes is called _____.
hacktivism
Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device
hardware
A form of spyware that records all actions typed on a keyboard is called a ___ logger.
keystroke
A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.
macro
Experts suggest using password ___ software to keep your passwords safe.
management
A typical ___ manager (such as Dashlane or LastPass) is installed as a browser plug in and provides for extremely secure logins.
password
A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I
password
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
Anti-malware apps
Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.
Anti-virus programs
Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats.
Firewalls
Help protect against worms and hackers: Firewall programs help protect against worms and hackers.
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
Which three of the following settings can you restrict in the Mac OS?
Limit access to specific websites Restrict user's access to other people through Game Center, Mail, and Messages Which apps the user can access
Select two true statements about fee-based (subscription-based) and free antivirus software programs.
Most fee-based software comes with technical support One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance
The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.
NAT (Network Address Translation)
Safari accepts cookies and website data from which of the following?
Only from websites you visit
In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?
Open the Advanced menu
Persistent cookies store information about which two of the following?
Password and username information User preferences
Which three of the following statements are true regarding passwords and passcodes?
Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password Keys are often generated by encryption software or by the vendor who produced the software
Which three of the following may be indications that your system has been hacked?
Redirected Internet searches Unwanted browser toolbars Fake e-mails or social media messages in your account
An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Server Router Computer
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
Session
After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?
Settings
Third-party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
First-party cookie
Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk:
Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?
Sxf6512@fg%
On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?
The Apple Menu
Which two of the following statements are true regarding firewalls?
The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.
A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.
Trojan
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
Trojan
Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.
True
The Windows Security in Microsoft Windows is accessed by clicking Control Panel then Update and Security. Which three of the following firewall settings you can adjust by clicking Firewall & network protection?
Update your firewall settings Change notification settings Turn Windows firewall on or off
Small text files created by websites you visit that your web browser stores on your hard disk are called _____.
cookies
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a
cyberattack
An attack using a computer is a ___.
cyberattack
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
Harming or harassing via information technology and networks in a repeated and deliberate manner is called
cyberbullying
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
cybercrime
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.
cybercrime
When a computer is used to commit a crime it is considered a ___.
cybercrime
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.
cyberterrorist
You can change your Firefox settings to allow you to do which three of the following?
deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.
It is important to think before you click when you ___ software from the Web.
download