Module 16: Computer Security and Internet Research

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

Which of the following HTML objects will find web pages with hyperlinks?

Anchor

What are Anti-virus programs?

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

"banana pudding is wonderful"

Search engine results will only show articles with the exact phrase "banana pudding is wonderful"

banana AND pudding

Search engine will show all articles that contain the words "banana", and the word "pudding"

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Select two true statements about packet sniffers.

Unauthorized sniffers are used to steal information. Legitimate sniffers are used for routine examination and problem detection.

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

A form of spyware that records all actions typed on a keyboard is called a

key logger

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a

zombie

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Computer Server Router

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

It is common practice for the website owner to submit their URL and associated information to the ______

Search Engine Company (SEC)

A collection of hacker-controlled computers is called a ________.

botnet

What does CIA represent?

Confidentiality Integrity Availability

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ________.

Cyber Attack

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

What are Anti-malware programs?

Help protect against malware: These apps help protect against a variety of malicious programs.

What are Firewalls?

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Malware is short for_______

Malicious Software

__________ is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

Search Engine Optimization

banana OR pudding

Search engine will show all articles with the word "banana" along with all articles with the word "pudding" in them

The malevolent use of computer code to change a computer or network's normal operations is called a(n) ________.

cyberattack

Most search engines use similar technology to execute an Internet search. The search engine uses a

database

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

email virus

When discussing HTML objects a ______ displays web pages about the search topic.

hyper link

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

Jacklyn types specific terms (words) into a search engine (Google, Bing, Yahoo, etc.) when she wants to find an article on the World Wide Web. This is called a

keyword

What type of virus is written in a macro language and placed in a document or table?

macro viris

Specialized hardware or software that capture packets transmitted over a network are called _____.

packet sniffers

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.

pharming

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Checking how current the information is on a website helps to ensure

revelance


Ensembles d'études connexes

Chapter 3 /The Context of Situation

View Set

Chapter 5 (Microeconomics) Elasticity and its Application

View Set

Ch 18 (ARH II) High Renaissance & Mannerism in Northern Europe and Spain

View Set

Health Online- The Importance of Mental and Emotional Health and Building Healthy Relationships- The importance of Mental and Emotional Health

View Set

Temporary Life Insurance Polices

View Set

Microeconomics Chapter 1: Core Principles

View Set

Biology Ch.7 Modified Mastering Extra Credit

View Set

Fundamentals prep-U: CH.1 Nursing Process

View Set