Tech 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Put the following steps in the correct order for setting restrictions in Mac OS X. Instructions

1. Select system preferences 2. slick lock icon 3. select user

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

1. Server 2. Computer 3. Router

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

Proxy

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Adware often accompanies downloaded _____.

programs

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

1. Stored in temporary memory, ___ are used to analyze and measure traffic on a web page. 2. Determine the web browser being used. 3. Analyze and measure traffic on a web page. 4. Determine the start and end of a session.

session cookies

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Put the following steps in the correct order for turning on Parental Controls in Microsoft Windows. Instructions

1. Open parent control 2. click standard user 3. click on enforce setting 4. adjust time limit, access

Phishing

1. Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. 2. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank. 3. Tricks users into revealing usernames and passwords by appearing legitimate. 4. Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called ___

Digital identity

1. Social media postings 2. Online search activities 3. Purchasing behavior

A virus written in a macro language and placed within a document or spreadsheet is called a _____ .

macro virus

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

1. Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an ___ 2. Spoofing 3. Spyware 4. Spam 5. Frequent pop-ups while searching the web or working in programs 6. Pop-up start appearing after you visit unfamiliar sites.

online nuisance

1. A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called ___ 2. Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Which two of the following statements are true regarding firewalls?

1. Having more than one firewall app on your computer may cause conflicts and other problems. 2. The Mac OS includes firewall protection.

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which of the following?

1. Systems 2. Processes 3. Procedures

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

1. Meltdown 2. Spectre

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

1. Most fee-based software comes with technical support 2. One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

false

1. Specialized hardware or software that capture packets transmitted over a network are called ___ 2. Legitimate sniffers are used for routine examination and problem detection. 3. Unauthorized sniffers are used to steal information.

packet sniffers

1. Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called ___ 2. Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hacker

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Put the following steps in the correct order for navigating to the Windows firewall area. Instructions

1. start button 2. setting icon 3. update and security 4. windows security

Signed into law by President Clinton in 1998, The _____ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Ways to avoid a computer virus

1. Surf the web and download content safely. 2. Adjust your web browser's security settings to allow browsing only on trusted sites. 3. Install the latest antivirus software and update frequently. 4. Downloaded content from the web should only be from trusted sites. 5. Web surfing should be limited to trusted sites.

You need to adjust cookie and data permission settings in Google Chrome. Put the following steps in the correct order for adjusting cookie and site data permission settings in Google Chrome.

1. browser toolbar 2. privacy 3. cookies

Which component of a network designed to prevent unauthorized Internet intrusions?

Firewall

Put the following steps in the correct order for adjusting cookie settings.

1. safari 2. preferences 3. privacy 4. change cookies setting

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which of the following?

1. Literary works 2. Music 3. Pictures

Virus symptoms

1. Critical files are deleted/ encrypted automatically 2. The operating system does not launch properly 3. Strange error messages or pop-up ads

Which of the following are common email virus

1-ransomware 2-keystroke logging trojan

Which three of the following statements are true regarding passwords and passcodes?

1. 2. 3.

Which 2 of the following statements are true about passwords?

1. Check your accounts. Regularly check your accounts to ensure they have not been tampered with. 2. Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. Need help? Review these concept resources. Feedback Continue

Ways to catch a computer virus

1. Finding a thumb drive and then using it in your laptop 2. Downloading files from questionable Internet sites 3. Opening suspicious or infected e-mail messages. 4. Visiting questionable websites.

Which of the following are considered e-commerce transactions?

B2B B2C C2C

International laws on Internet privacy are very similar.

False

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

A transceiver can both send and receive information.

True

An attack using a computer is a ___.

cyberattack

which following is consider cybercrime?

data manpulation

The software code of a particular computer virus is called the virus .____

signature

In order to prevent your data and identification from being stolen, it is a good idea to protect your radio frequency identification (RFID) enabled items with an RFID data protection _____ or wallet.

sleve

changing cookies preferences or removing cookies and other website data in safari my change/ remove them in other app. Rank them:::

1-choose safari 2-click preferences 3-privacy 4-cookie settings

common symptoms of computer virus

1-document wont save 2-compter run extremely slow 3-program launch their own

Which consider cybercrime?

1-internet scam 2-cyberspionage 2-information theft

Which of the following are considered Intellectual property?

1. Trade secrets 2. Patents 3. Trademarks

If you believe you have fallen victim to a phishing scam you should:

1. contact the institution the message was allegedly sent from 2. contact US-CERT

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

1. heuristic-based detection 2. signature-based detection

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.

Anti-malware apps

Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

Anti-virus programs

Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats.

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

Which of the following are parts of a radio frequency identification (RFID) system?

Transponder Antenna Transceiver

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

A Radio frequency identification (RFID) systems consists of three components: _____ transponder, and transceiver.

antenna

Heuristic and signature-based detection are two techniques used by ___ software.

antivirus

Derived from the Greek word ergon (work) and nomoi (natural laws), _____ is an important element of workplace safety.

ergonomic

Two common categories of cybercrime include single event and ____ series of events

on-going

1. Software programs that hide in the operating system and allow for the installation of hidden files are called ___ 2. A type of malware that is triggered each time you boot your computer is called a ___

rootkits

often accompanying download music or app, program that appear to be legitimate but execute unwanted activity when activate is called ___

trojan horse

If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.

$500.00

Which of the following statements are true about ergonomics?

-Derived from the Greek words ergon (work) and nomoi (natural laws). -The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations. -A very important element of an effective workplace safety plan.

Which of the following statements are true regarding RFID?

-RFID does not require line-of-sight scanning -Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Cyberattack include

1- DDoS attack 2- email spam 3-idenity theft

True about trojan malware

1- often found attach to free download and apps 2-often used to find PW, destroy data, or bypass firewall

select whats true session cookies

1-analyze and measure traffic on web page 2-determine the star and end of session 3-determine web browser being used

change Firefox setting allow you to ___

1-approve cookies storage request 2-deny cookie storage request 3-delete stored cookies automatically when start Firefox

what is true of worm

1-automatically reproduce 2-replicate exhaust network bandwidth or available storage 3-often sent using email attachment

according to mozilla, one most effective ways to clear cookies in firefox is?

1-click menu button, choose history, clear 2-once clear, you should set time range to clear everything 3-click on arrow to details expand history item 4-select cookies and make sure other you want are not selected

true about packer sniffer

1-legitimate sniffers are used for routine examination and problem detection 2-use viruses to capture data packets

script kiddies

1. Amateur computer hackers with little programming expertise. 2. Illegally gain access to computer systems using programs (scripts) that others have written. 3. Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

The Windows Security in Microsoft Windows is accessed by clicking Control Panel then Update and Security. Which three of the following firewall settings you can adjust by clicking Firewall & network protection?

1. Change notification settings 2. Update your firewall settings 3. Turn Windows firewall on or off

persistent cookies.

1. Collect information about user preferences. 2. Collect password and username information. 3. Collect information about the Internet protocol (IP) Address. 4. Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______

Which three of the following you should consider in the settings area of each browser?

1. Deleting cookies 2. Blocking or customizing your cookie settings 3. Decide from which sites you want to allow cookies

Cyberattacks include which three of the following?

1. Distributed denial-of-service (DDOS) attacks 2. Pharming 3. Identity theft using a computer or network

Which two of the following are ways to safely download antivirus software?

1. Download the software from a trusted site like www.cnet.com 2. Download the software from a known antivirus software vendor

According to US-CERT, if you receive a phishing message, which of the following methods should use to report the issue?

1. In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected] 2. Contact the via the phone number listed on the US-CERT site.

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

1. Proxy servers 2. Packet filters

Which three of the following may be indications that your system has been hacked?

1. Unwanted browser toolbars 2. Fake e-mails or social media messages in your account 3. Redirected Internet searches

Put the following steps of a virus infection in the correct order.

1. Virus arrive 2. open and run virus 3. virus infect

Select three privacy risks associated with cookies.

1. Websites can track your surfing behavior and create a profile. 2. Corporate and government entities can track your web behavior. 3. Websites using cookies can collect your information and sell it to third parties.

Internet privacy

1. Who has access to data and information 2. Techniques and technologies used to protect sensitive data and information 3. How data and information is used

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

1. blocking/allowing cookies by default. 2. making exceptions for cookies from specific websites or domains. 3. deleting cookies.

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

1. keystroke logging Trojan 2. phishing 3. ransomware

In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a __-degree angle.

45

If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.

50.00

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

COPPA the Red Flags Rule

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:

Internet

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is .____

Paypal

To delete cookies in Safari, click ___.

Preferences

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

Which three of the following are factors to consider to help protect the hardware of your digital device?

Protecting a digital device from magnetic fields Protecting a digital device from humidity Protecting a digital device from overheating

Passports issued by the United States and many other countries include ____

RFID chip

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

First-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk:

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan horse virus

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE (Unsolicited Bulk E-mail)

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Wyatt needs a password for his school's e-mail system. Which password is the most secure?

Xj9%ft7

___breaks into computer systems with the intent of causing damage or stealing data

black hat hacker

group compromise computers controlled by hacker is called a ____

botnet

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to- ______transaction.

consumer

small text file of information created on website you visit that you web browser stores on your hard disk is _____

cookies

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a: ___

cyberbully cyberbullying, bullying, cyber bullying, or cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

It is important to think before you click when you _____ software from the Web.

download

1. Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ___ 2. Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email, e-mail, or Email

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio _____ Identification.

frequency

1. Juan attempts to gain unauthorized access to networks. Juan would be considered a _____. 2. A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ___

hacker hacker, cyberhacker, cracker, or black hat hacker

1. A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___ 2. Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

act of hacking, breaking into computer system for politically or socially motivated purpose is called ___

hacktivism

Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device

hardware

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

A form of spyware that records all actions typed on a keyboard is called a ___

keystroke/ key logger

You should consider where/how you place the following to create an ergonomically correct workstation, which includes:

monitor keyboard chair

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I

password

A popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

paypal

Cookies stored on a computer hard drive and use to collect and store info about user preferences, pw, user info, ip, and surfing web is called ____ cookies

persistent

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

1. Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a ___ 2. Most e-mail applications, such as Gmail and Outlook, provide robust ___ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam filter

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was ___

spam or trojan virus

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

persistent cookies store information about

user preferences

software infect computer and is created using computer code is called computer ___

virus

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called ___

adware

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

antivirus software

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _____

copyright

1. A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____. 2. Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a _____

cyberterrorist

Rootkits are typically used to allow hackers to do which three of the following?

1. Install rogue files 2. Encrypt files 3. Create backdoors

Which three of the following settings can you restrict in the Mac OS?

1. Limit access to specific websites 2. Which apps the user can access 3. Restrict user's access to other people through Game Center, Mail, and Messages

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS (distributed denial of service) or DoS (denial of service)

A group of compromised computers controlled by a hacker is called a _____.

botnet


Ensembles d'études connexes

CH.7 Texas Real Estate License Act

View Set

N400 (E3) Ch 38: Bowel Elimination

View Set

ELA: Analysis of "The Love Song of J. Alfred Prufrock"

View Set

CH11: Infancy Through Adolescence - Fundamentals

View Set

Engineering Management 2 (Lecture 9)

View Set

Sharepoint - Ch 6: Configuring Lists

View Set

Probability and Two-Way Tables- assignment

View Set

Adv. Concepts Chapter 37: Musculoskeletal Trauma

View Set