ITEC Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

is software that collects the user's web browsing history. This data is collected then used to create unsolicited targeted pop-up advertisements

Adware

is a small text file of information created by websites you visit that your web browser stores on your hard disk.

Cookies

are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

White hat hacker

what is not true about worms. a)designed to attack only wired networks b)often sent using email attachments c)automatically reproduce d)replication exhausts network bandwidth or available storage

a

Software used to collect data to create unsolicited targeted pop-up advertisements is called _____

adware

a common symptom of a computer virus infection does not include a)a voice the speaks to you from the computer b)a pop-up advertisement c)a mouse that has run out of batteries d)a slow running machine

c

is a software that infects computers and is created using computer code

computer virus

A small text file of information created when you visit a website

cookie

The bad use of computer code to modify the normal operations of a computer is called a _______

cyber attack

A deliberate misuse of computers and networks via the internet

cyberattack

Harassing a person via information technology in a repeated and deliberate manner is called

cyberbullying

which is not considered a cyber-crime? a)identity theft b)cyber-espionage c)internet scams d)cyber monitoring

d

put the steps of a virus infection in the correct order a)the infection is spread to other devices or a network b)an action such as running or opening the file triggers the virus c)the payload is activated and the virus starts its destructive action d)arrives by an email attachment or visiting an infected site (type it in like a,d,b,c)

d,b,a,c

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal or offense

cybercrime

Cyber attack include a)DDoS attacks and Spam mail b)identity theft and hardware theft c)Spam mail and Adware d)DDoS attacks and identity theft

d

If you believe you have fallen victim to a phishing scam you should contact US-CERT and __________ a)your ISP b)the police c)the US Post Office d)the institution the message was allegedly sent from

d

Which of the following is not considered a cyber-crime? a)data manipulation b)data corruption c)pop-up advertising d)cyberbullying

d

is a person who gains unauthorized access to networks.

hacker

The act of hacking for political or socially motivated purposes is called

hacktivism

A _____ records all actions typed on a keyboard.

keystoke logger

logger is a form of spyware that records all actions typed on a keyboard and can be hardware devices and software applications

keystroke logger

A virus that is written in a macro language and placed within a document or spreadsheet

macro virus

Is designed to steal information,destroy data,impact the operations of a computer or network or frustrate the user. is also short for malicious software

malware

Specialized hardware or software that captures packets.

packet sniffers

SPAM is

unsolicited email

DDOS stands for

Distributed Denial of Service

attack is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

Dos

is firewall software used to block a user's access to specific Internet content

Filter

is hardware or soft ware used to keep a computer secure from outside threats such as hackers and viruses.

Firewall

is the act of hacking, or breaking into a computer system for a politically or socially motivated purpose.

Hacktivism

Specialized hardware or software that capture packets transmitted over a network.

Packet sniffer

is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer.

Pharming

is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company.

Phishing

are would-be hackers who attempt to gain unauthorized access to networks and in order to steal and corrupt information and data.

Script kiddie

When an infected file is found to have a virus and cannot be removed it is moved to ??

quarantine

is malware that makes a computer's data inaccessible until a ransom is paid

ransomware

are software programs that hide in the operating system

rootkit

amateur computer hackers with little programming expertise who attempt to gain illegal access to a computer are called?

script kiddies

is software that collects information about your Internet surfing habits and behaviors.

spyware

Is a program that appears legitimate, but executes and unwanted activity when activated

trojan

An email that appears to be legit but has a virus inside,

trojan horse

A group of compromised computers controlled by a hacker is called a botnet. (true or false)

true

software that infects a computer and is created using computer code is called a computer ______?

virus

Non-malicious computer security experts that test a network

white hat hacker

A destructive program that replicates itself throughout a single a single computer or a network is a

worm

a destructive program that replicates itself throughout a single computer or across a network

worm

Your computer has been attacked and overtaken by a hacker. Your computer is known as a ________ computer

zombie

s a computer that has been secretly taken over by an outsider,typically using a rootkit, and subsequently programmed to perform a variety of damaging tasks.

zombie


Ensembles d'études connexes

Chapter 14: Energy Resources- Fossil Fuels

View Set

IB Psych SVHS Semester 1 Studies

View Set

Chapter 12 Diverse Learners Vocabulary words

View Set

Chapter 16: The Endocrine System

View Set