Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

$50

Put the following steps in the correct order for adjusting cookie settings for safari

1. choose safari 2. preferences 3. privacy 4. cookie settings

Which of the following are considered e-commerce transactions?

B2C C2C B2B

Rootkits are typically used to allow hackers to do which three of the following?

Create backdoors Install rogue files Encrypt files

Signed into law by President Clinton in 1998, The _________ implements two World Intellectual Property Organization (WIPO) treaties.

DMCA (Digital Millennium Copyright Act)

Function of session cookies

Determine the web browser being used. Determine the start and end of a session. Analyze and measure traffic on a web page.

DDoS stands for ___.

Distributed Denial of Service

common symptoms of a computer virus

Documents will not save Programs launch on their own

The DMCA protects ___ from liability for copyright violations of its users

ISP's

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Computer Router

First- party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

A Radio frequency identification (RFID) systems consists of three components

antenna, transponder, and transceiver.

hacker that breaks into computer systems with the intent of causing damage or stealing dat

black hat

A group of compromised computers controlled by a hacker is called a _____.

bootnet

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a

denial of service

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke logger

A virus written in a macro/ specific language and placed within a document or spreadsheet is called a

macro virus

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an

online nuisance.

Specialized hardware or software that capture packets transmitted over a network are called

packet sniffers

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

proxy

U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts)

script kiddies

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

settings

The software code of a particular computer virus is called the virus

signature

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

the Red Flags Rule (Program designed to detect the warning signs of identity theft) COPPA (The Children's Online Privacy Protection Act)

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.

$500

The main federal governmental organization that oversees Internet privacy is the

(FTC) Federal Trade Commission

turning on Parental Controls in Microsoft Windows.

1. parental control 2. standard user account you want to set controls for 3. click "on" and enforce settings 4. adjust time limits, access specific programs/ websites

set parental controls in Mac OS X.

1. preferences, parental control 2. unlock lock icon, enter admin name and password 3. select user, enable parental control 4. add and create new user if not on the list

order for navigating to the Windows firewall area.

1. start button 2. setting icon 3. update and security 4. windows security

Computers infected with a virus exhibit many symptoms including

OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads

Safari accepts cookies and website data from which of the following

Only from websites you visit

Cyberattacks include:

Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk

Intellectual property include

Trademarks Trade secrets Patents

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Which of the following organization you should contact if you receive a phishing message?

US CERT (United States Computer Emergency Readiness Team)

Keystroke-logging Trojan matches

When activated, saves all keystrokes for subsequent transmission to virus creator

Which three of the following settings can you restrict in the Mac OS?

Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

Having more than one firewall app on your computer may cause _______ and other ____

conflicts and problems

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to______ transaction

consumer

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

RFID (radio frequency identification.) characteristics: - RFID does not require __________ - Can be used to identify or track a variety of objects including poker chips, products, and even _______.

line-of-sight scanning animals

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.

Fee-based antivirus software often provides _______ features than free anti-virus software.

more

Digital Identity

online search activities purchasing behavior social media postings

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

When you open the options tab in Firefox, where would you click to adjust cookie settings?

privacy and security

A type of malware that is triggered each time you boot your computer/ installation of hidden files hidden in OS is called a

rootkit

an unsolicited e-mail message from an unknown sender

spam

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

ergonomics

A very important element of an effective workplace safety plan. Derived from the Greek words ergon (work) and nomoi (natural laws). The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.

passwords and passcodes?

Keys are often generated by encryption software or by the vendor who produced the software Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password

The ____ OS includes firewall protection.

Mac

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Third- party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE (Unsolicited Bulk E-mai)

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a

spam filter

Internet privacy

who has access to data/ information how data/ info is used techniques and technology that is used to protect sensitive data

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

fee-based (subscription-based) and free antivirus software programs.

One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance Most fee-based software comes with technical support

Which settings can you adjust by clicking Firewall & network protection?

Turn Windows firewall on or off Update your firewall settings Change notification settings

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.

Meltdown and Spectre

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

According to US-CERT, if you receive a phishing message, how do you report it

Contact the via the phone number listed on the US-CERT site. In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]


Ensembles d'études connexes

Intermediate 3 final: computational

View Set

Chapter 9 PRE, HW, and Clicker Questions

View Set

NRS222 Mental health and mental illness

View Set

Ch. 11 Fundamentals of the Nervous System and Nervous Tissue

View Set

Chapter 3 Health, Policy, Politics and Reform

View Set

Smart Book Assignment -Ch 12 - Solutions

View Set

Ky Property and Casualty Exam Notes

View Set