ITEC Chapter 5 - Cyber Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Rootkits allow remote users to do what?

Create backdoors that bypass securities, delete files, and install rogue riles

A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___:

Cyberattack

Deliberate misuse of computers and networks, ___ use malicious code to modify the normal operations of a computer network:

Cyberattacks

What's ransomware?

Encrypts files on user's hard drive, then sells decryption program

What are some common symptoms of a computer virus?

Programs launch on their own or documents won't save

Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. T or F?

True

The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998. The act implements two World Intellectual ___ Organization treaties:

Property

What terms are associated with "online nuisances"?

1. Spam 2. Adware

Online nuisances include:

1. Spam 2. Spyware 3. Phishing and Pharming 4. Trolling and Spoofing

Software programs that hide in the operating system and allow for the installation of hidden files are called:

Rootkits

What's a keystroke-logging Trojan?

Saves all keystrokes for subsequent transmission to virus creator

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session cookies

Computer software that's designed to prevent spam messages from entering into a user's e-mail box is called a ___ filter:

Spam

One version of malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This is called ___:

Ransomware

If the investigation from the bank determines that those transactions were fraudulent, your bank must replace the funds within ___ business day(s):

1

Which of the following are online nuisances? 1. Spyware 2. Spam 3. First party cookies 4. Spoofing

1, 2, and 4

The fastest way to clear cookies in Firefox is...:

1. Set "time range" to clear in "everything" 2. Click on the arrow next to "details" 3. Select "cookies" 4. Click "clear now" and close the "clear recent history" window

What's true about ergonomics? 1. Fits the user to the task instead of fitting the task to the user 2. Derived from the greek words ergon (work) and nomoi (natural laws) 3. Study of human interaction with the objects they use 4. An important element of an effective workplace safety plan

2, 3, and 4

What's true about persistent cookies? 1. Stored in temporary memory and are lost when the web browser is closed 2. Collect info. about user preferences 3. Collect info. about the IP address 4. Collect pass and username info.

2, 3, and 4

The TPP covers just under ___ percent of global GDP:

40

Under the TPP, copyrighted works will pass into the public domain ___ years after the death of the creator, extending the term for some countries like New Zealand by a further 20 years:

70

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses:

Address

Displaying ads based on profiles and browsing history is an online nuisance called ___:

Adware

A group of compromised computers controlled by a hacker is called a ___:

Botnet

A hacker launches an attack on a network that's designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a ___ attack:

DoS

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are...:

Heuristic-based and signature-based detection

Firewall software used to block a user's access to specific internet content is called a(n) ___ filter:

Internet

A form of spyware that records all actions typed on a keyboard is called a ___ logger

Keystroke

Tech that provides a type of firewall protection by hiding internal IP addresses is called ___:

NAT (network address translation)

On ___ in the U.S., the liability of paying for the fraud will fall on the party that is least chip-enabled:

October 1, 2015

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___:

Pharming

The illegitimate use of an email message used to collect personal info. and appears to be from an established organization is called ___:

Phishing

Passports issued by the U.S. and many other countries include ___ chips:

RFID

A worm is a type of malware that ___ itself throughout a single computer or across a network:

Replicates

A type of malware that's triggered each time you boot your computer is called a ___:

Rootkit

Typically computer viruses must be ___ to attack and do damage to a digital device:

Run

Specialized soft/hardware that capture packets transmitted over a network are called packet ___:

Sniffers

Software that collects information about your internet surfing habits and behaviors is called ___:

Spyware

Malware is designed to do what?

Steal information, incapacitate a computer or network, and destroy data

The TPP stands for what?

Trans-Pacific Partnership

What's phishing?

Tricks users into revealing usernames and passwords

A program that appears legit, but executes unwanted activity when activated is called a ___ horse virus:

Trojan

If you receive a phishing message, who should you contact?

US-CERT

A computer controlled by a hacker is called a ___:

Zombie

What's true about sniffers? 1. Unauthorized sniffers are used to steal info. 2. Use viruses 3. Can be difficult to detect 4. Legitimate sniffers are used for routine examination and problem detection

1 and 4

What's true about keystroke loggers? 1. It can be hardware or software 2. Can record passwords and confidential info. 3. Usually a Trojan that's installed without the user's knowledge 4. They can't monitor employees

1, 2, and 3

What's true about macro viruses? 1. Initiated by downloading and opening an infected attachment 2. Commands in the macro language set off the destructive events 3. When file is opened, the macro virus executes 4. Usually found in MP4 files

1, 2, and 3

What kind of e-commerce transactions are these? 1. Consumer makes a purchase from a site 2. Consumer makes arrangements to buy a used snowboard with another user on the same site 3. A grocery store places an order for goods

1. B2C 2. C2C 3. B2B

What terms are associated with the word "hacker"?

1. Black hats 2. Script kiddies 3. Cyberterrorists

Cyberattacks include:

1. DOS attack 2. Packet Analyzer 3. Rootkit

Viruses include:

1. Macro 2. Trojan horse 3. Worm

After you tell your bank about the fraudulent charges, it has ___ business days to investigate:

10

Software programs that hide in the operating system and allow for the installation of hidden files are called ___:

Rootkits


Ensembles d'études connexes

ECON 1000 Final Steffans & Whitworth Fall 2019

View Set

Closing the Real Estate Transaction

View Set

Vertical and Horizontal TransitionsWhich of the following statements best describes a trigonometric function having undergone a phase shift? Select all that apply.

View Set

endocrine exam 1 pineal gland and melatonin

View Set

3.1 Basic Machine Startup-Basic Lathe Operator

View Set

Study**Chapter 9: Drug Therapy for Coagulation Disorders

View Set

Intro to New Testament Ch. 6,7,8,11

View Set

Chapter 5 Unit 3: Listing Agreements

View Set

ARH 151 Test 3 Vocab 2.2, 4.10, 4.11

View Set