Module 16: Computer Security and Internet Research
On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?
Advanced
Which of the following HTML objects will find web pages with hyperlinks?
Anchor
What are Anti-virus programs?
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
"banana pudding is wonderful"
Search engine results will only show articles with the exact phrase "banana pudding is wonderful"
banana AND pudding
Search engine will show all articles that contain the words "banana", and the word "pudding"
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
Trojan
Select two true statements about packet sniffers.
Unauthorized sniffers are used to steal information. Legitimate sniffers are used for routine examination and problem detection.
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
adware
A form of spyware that records all actions typed on a keyboard is called a
key logger
Software that illicitly collects information about your Internet surfing habits and behaviors is called __.
spyware
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a
zombie
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Computer Server Router
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
It is common practice for the website owner to submit their URL and associated information to the ______
Search Engine Company (SEC)
A collection of hacker-controlled computers is called a ________.
botnet
What does CIA represent?
Confidentiality Integrity Availability
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ________.
Cyber Attack
What are the two common symptoms of a computer virus?
Documents will not save Programs launch on their own
Which two of the following statements are true regarding firewalls?
Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.
What are Anti-malware programs?
Help protect against malware: These apps help protect against a variety of malicious programs.
What are Firewalls?
Help protect against worms and hackers: Firewall programs help protect against worms and hackers.
Malware is short for_______
Malicious Software
__________ is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.
Search Engine Optimization
banana OR pudding
Search engine will show all articles with the word "banana" along with all articles with the word "pudding" in them
The malevolent use of computer code to change a computer or network's normal operations is called a(n) ________.
cyberattack
Most search engines use similar technology to execute an Internet search. The search engine uses a
database
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
email virus
When discussing HTML objects a ______ displays web pages about the search topic.
hyper link
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
Jacklyn types specific terms (words) into a search engine (Google, Bing, Yahoo, etc.) when she wants to find an article on the World Wide Web. This is called a
keyword
What type of virus is written in a macro language and placed in a document or table?
macro viris
Specialized hardware or software that capture packets transmitted over a network are called _____.
packet sniffers
Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.
pharming
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
ransomware
Checking how current the information is on a website helps to ensure
revelance