ITEC 1001 - Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Software programs that hide in the operating system and allow for the installation of hidden files are called

rootkits

Rootkits are typically used to allow hackers to do which three of the following?

Create backdoors Install rogue files Encrypt files

To delete cookies in Safari, click ___.

Preferences

The main governmental organization that oversees Internet privacy in the United States is the Federal

Trade Commission

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Select three functions of session cookies.

Determine the start and end of a session. Analyze and measure traffic on a web page. Determine the web browser being used.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Cyberattacks include which three of the following?

Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network Pharming

The DMCA protects ___ from liability for copyright violations of its users.

ISP

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

Keystroke

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Strange error messages or pop-up ads Files get deleted or encrypted

Which of the following are symptoms of an online nuisance attack?

Receiving a lot of spam messages or bounced back e-mail messages. Pop-up start appearing after you visit unfamiliar sites. Frequent pop-ups while searching the web or working in programs

Web Cookies

Small text file of information created by websites you visit that your web browser stores on your hard disk:

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Select three privacy risks associated with cookies.

Websites can track your surfing behavior and create a profile. Corporate and government entities can track your web behavior. Websites using cookies can collect your information and sell it to third parties.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

Do you know when you are at risk?An attack using a computer is a ___.

cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ________of service attack.

denial

A form of spyware that records all actions typed on a keyboard is called a ____________

keylogger

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

Adware often accompanies downloaded _____.

programs

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called_______kiddies

script

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

Virus symptoms

The operating system does not launch properly Critical files are deleted automatically

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

Software that illicitly collects information about your Internet surfing habits and behaviors is called __________

Spyware

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

Select two true statements about packet sniffers.

1)Legitimate sniffers are used for routine examination and problem detection. 2)Unauthorized sniffers are used to steal information.

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a ___________

Email

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. Contact the via the phone number listed on the US-CERT site.

Which of the following are online nuisances?

Spam Spyware Spoofing

A program that appears legitimate, but executes an unwanted activity when activated is called a

Trojan horse virus

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

A group of compromised computers controlled by a hacker is called a _____.

botnet

A virus written in a macro language and placed within a document or spreadsheet is called a _____ .

macro virus

A virus written in a specific language and placed within a document or spreadsheet is called a

macro virus

Stored in temporary memory,_________cookies are used to analyze and measure traffic on a web page.

session

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

One of the risks with cookies is ______________

websites using cookies can collect your information and sell it to third parties

Put the following steps of a virus infection in the correct order.

1) The virus arrives via email attachment, file download or by visiting an infected site 2) An action such as

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Typically computer viruses must be _____ to attack and do damage to a digital device.

Opened and run

Which of the following two statements best describe phishing?

Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

A destructive program that replicates itself throughout a single computer or across a network is called a __.

Worm

If you believe you have fallen victim to a phishing scam you should:

contact the institution the message was allegedly sent from contact US-CERT

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

Ways to catch a computer virus

Finding a thumb drive and then using it in your laptop Downloading files from questionable Internet sites

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at ________a company better known for its search engine and its Pixel series smartphones.

Google

Which two of the following can help prevent a virus infection?

Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

Cyberterrorist

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

Ransomware

Software that illicitly collects information about your Internet surfing habits and behaviors is called

Spyware

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

ransomware keystroke logging Trojan phishing

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.

Choose Safari Click preferences Click Privacy Change cookie settings

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Meltdown Spectre

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

First-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Select three true statements regarding persistent cookies.

Collect password and username information. Collect information about the Internet protocol (IP) Address. Collect information about user preferences.

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

the Red Flags Rule COPPA

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called ____________

Cybercrime

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a __ filter.

spam

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an _________nuisance

online

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

Which three of the following may be indications that your system has been hacked?

Fake e-mails or social media messages in your account Redirected Internet searches Unwanted browser toolbars


Ensembles d'études connexes

PrepU Chapter 6: Values, Ethics, and Advocacy

View Set

Chapter 3 Income Statement and Statement of Stockholders' Equity

View Set

Unit/module quiz questions WGU Intro to Communications

View Set

BLAW2200 - Chapter 5 Constitutional Law

View Set

Chapter 6 U.S. History Study Guide

View Set

Chapter 15 & 16: The 1st Global Age (European exploration and conquest)

View Set

Finance - Ch. 20 Financial Options

View Set