ITEC CONNECT CHAPTER 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

cyberbullying

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

contact US-CERT

If you believe you have fallen victim to a phishing scam you should

white hat

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hackers.

User preferences

Persistent cookies store information about

UBE

Spam messages are sometimes referred to as ___.

snakes

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

on-going

Two common categories of cybercrimes include single events and _____ series of events.

macro virus

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

1. data manipulation 2. data corruption 3. cyberbullying

Which of the following are considered cybercrimes?

data manipulation

Which of the following would be considered a cybercrime?

macro

A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.

1. Choose Safari. 2. Click Preferences. 3. Click Privacy. 4. Change cookie settings.

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari.

quarantine

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

spyware

Software that collects information about your Internet surfing habits and behaviors is called _____.

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

1. Internet scams 2. cyberespionage 3. information theft

Which of the following are considered cybercrimes?

Zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

worm

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Botnet

A group of compromised computers controlled by a hacker is called a _____.

Cookie

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

spam

An unsolicited email message is called _____

session cookies

Cookies that are held in temporary memory and used to analyze and measure traffic on a Web page are called ___ cookies.

Distributed Denial of Service

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

black

A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

Zombie

A computer controlled by a hacker is called a _____.

keystroke

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Hacker

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.

1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings. 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.

According to Microsoft, what is the correct order of steps for deleting cookies in Internet Explorer (Microsoft Edge)?

1. Click the menu button, choose History, and then Clear Recent History. 2. Once you have cleared recent history you should set the time range to clear Everything. 3. Click on the arrow next to Details to expand list of history items. 4. Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.

According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?

virus

Software that infects a computer and is created using computer code is called a computer _____.

Persistent

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

1. Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2. Tap or click the Tools button Tools , and then tap or click Internet options. 3. On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4. When you're done making changes, tap or click OK.

According to Microsoft, the most efficient order of steps to customize cookie settings is?

Script kiddies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

hacktivism

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

Phishing

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ___.

cyberattack

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .


Ensembles d'études connexes

DECA Hospitality and Tourism Cluster Study Set

View Set

Chapter 8: Early Jewish, Early Christian and Byzantine Art

View Set