ITEC 1001 Security
In the settings area of each browser you should consider
-periodically deleting cookies -blocking/customizing cookie settings -decide from which sites you allow cookies
Rootkits are typically used to allow hackers to do which three of the following?
Create backdoors Install rogue files Encrypt files
Which three of the following statements are true regarding passwords and passcodes?
Passwords can be used to secure computers, networks, software, personal accounts, and digital devices Keys are often generated by encryption software or by the vendor who produced the software The terms passcode and key are synonymous for password
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
Safari accepts cookies and website data from which of the following?
only the websites you visit
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffer
According to US-CERT if you receive a phishing message you should contact them using which of the following methods.
-In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. -In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. -If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT
Common symptoms of a computer virus infection include
-OS doesnt launch -files deleted -strange error messages or pop up ads
Which of the following statements are true regarding RFID?
-RFID does not require line-of-sight scanning -Can be used to identify or track a variety of objects including poker chips, products, and even animals.
A program that appears legitimate, but executes an unwanted activity when activated is called a
Trojan horse virus
Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.
-ransomware -keystroke logging Trojan -phishing
Select two true statements about fee-based (subscription-based) and free antivirus software programs.
-Most fee-based software comes with technical support -One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance
Cyberattacks include which three of the following?
-Pharming -Identity theft using a computer or network -Distributed denial-of-service (DDOS) attacks
There are a variety of cookie settings that can be adjusted in Google Chrome including
-blocking/allowing cookies by default.-deleting cookies-making exceptions for cookies from specific websites or domains.
Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?
-coppa -the Red Flags Rule
Rootkits allow a remote user to do which of the following.
-delete files -create backdoor programs -install rogue files
cyberattacks include
-DDoS attack -identifty theft
You can change your Firefox settings to allow you to
-approve -deny -delete cookies
According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?
1.Click the menu button, choose History, and then Clear Recent History. 2.Once you have cleared recent history you should set the time range to clear Everything. 3,Click on the arrow next to Details to expand list of history items. 4.Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.
According to Microsoft, the most efficient order of steps to customize cookie settings is?
1.Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2.Tap or click the Tools button Tools , and then tap or click Internet options. 3.On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4.When you're done making changes, tap or click OK.
Put the following steps in the correct order for navigating to the Windows firewall area.
1.start 2.setting 3.update and security 4.window security
Which of the following are parts of a radio frequency identification (RFID) system?
Antenna Transceiver Transponder
Which of the following are considered e-commerce transactions?
C2C B2C B2B
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack
DDoS or DoS
Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?
Packet filters Proxy servers
Which of the following are considered Intellectual property?
Trade secrets Patents Trademarks
Which three of the following settings can you restrict in the Mac OS?
Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites
What type of hacker breaks into computer systems with the intent of causing damage or stealing data?
black hat
A group of compromised computers controlled by a hacker is called a _____.
botnet
The malicious use of computer code to modify the normal operations of a computer or network is called a ___
cyber attack
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cybercrime
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.
cybercrime
put the steps of a virus infection in the correct ordera)the infection is spread to other devices or a networkb)an action such as running or opening the file triggers the virusc)the payload is activated and the virus starts its destructive actiond)arrives by an email attachment or visiting an infected site(type it in like a,d,b,c)
d,b,a,c
International laws on Internet privacy are very similar.
false
Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.
false
The DMCA protects ___ from liability for copyright violations of its users.
isp
A form of spyware that records all actions typed on a keyboard is called a
keystroke logger
What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?
proxy
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
ransomeware
A type of malware that is triggered each time you boot your computer is called a
rootkit
Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.
script kiddie
Software that illicitly collects information about your Internet surfing habits and behaviors is called __.
spyware
Software that infects a computer and is created using computer code is called a computer _____.
virus
Common types of malware include______ .
virus,worm,trojan horses
Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.
white hat
A destructive program that replicates itself throughout a single computer or across a network is called a __.
worm
Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?
Fee-based antivirus software often provides more features than free anti-virus software.