2-4: Cybersecurity

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ____ of service attack.

Denial

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called ___.

ransomware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Select all that apply In Firefox, cookies can store a wide range if information including which of the following?

A) Email address ✅ B) Home address ✅ C) Name ✅ D) Social Security Number Reason: Firefox will not store your Social Security Number.

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called ____.

Cybercrime

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ______.

cyberattack

An attack using a computer is a ___.

cyberattack

When a computer is used to commit a crime it is considered a ___.

cybercrime

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

keystroke logger

Malware is short for ___ software.

malicious

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called ___.

pharming.

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called ____.

phishing

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

Select all that apply Which three of the following are well-known e-mail attacks?

A) Spam Reason: Spam is nuisance e-mail, but not considered e-mail viruses. B) Ransomware ✅ C) Phishing ✅ D) Keystroke-logging Trojan ✅

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

A) UBM B) UBE ✅ C) UEB D) USB

Select all that apply Which of the following may be indications that your system has been hacked? (Select all that apply.)

A) Unwanted browser toolbars ✅ B) The computer turns on or off by itself ✅ C) Fake e-mails or social media messages in your account ✅ D) Frequent random pop-ups ✅

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

A) Web Reason: Session cookies are stored in temporary memory and lost when the browser is closed. B) Persistent Reason: Persistent cookies are stored on a user's hard drive. C) Session ✅ D) Standard Reason: Session cookies are stored in temporary memory and lost when the browser is closed.

Which of the following three are common types of malware?

A) Worms ✅ B) Spam C) Viruses ✅ D) Trojans ✅

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

A) cookies ✅ B) drivers Reason: Drivers allow hardware and software to communicate. C) spam Reason: Spam is an unsolicited e-mail message. D) apps Reason: Apps are software designed for specific tasks.

A type of malware that is triggered each time you boot your computer is called a ___.

Rootkit

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

A program that appears legitimate but executes an unwanted activity when activated is commonly called a __.

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus.

Trojan

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called ___.

adware

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Malware may be designed to do which three of the following?

A) Collect information for marketers B) Steal information ✅ C) Incapacitate a computer or network ✅ D) Destroy data ✅

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

A) Confidentiality B) Integrity C) Availability ✅

Select all that apply Which two of the following statements are true regarding firewalls?

A) Having more than one firewall app on your computer may cause conflicts and other problems. ✅ B) Microsoft recommends installing at least two firewalls on your personal computer. C) You should not combine an operating system firewall with an antivirus app. D) The Mac OS includes firewall protection. ✅

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Private

Software that infects computers and is created using computer code is called a computer _____.

virus

Put the following steps of a virus infection in the correct order.

1) The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2) An action such as running or opening the file triggers the virus. 3) The payload is activated and the virus starts its destructive actions.

Select all that apply The use of cookies allows you to do which of the following?

A) Control the security of other devices Reason: Cookies do not allow you to control security on other devices. B) Store site preferences ✅ C) Remain signed into websites ✅ D) Surfacing of local (geotargeted) content ✅

Which three of the following are ways to prevent computer virus infections?

A) Install the latest antivirus software and update frequently. ✅ B) Downloaded content from the web should only be from trusted sites. ✅ C) Web surfing should be limited to trusted sites. ✅ D) Frequently close programs and restart your computer.

Computer viruses can infect a digital device in which three of the following ways?

A) Making a phone call on a digital device B) Opening an infected e-mail attachment ✅ C) Downloading an infected file from the Internet ✅ D) Visiting a contaminated website ✅

Select all that apply Which three of the following are considered cybercrimes?

A) Cyberbullying ✅ B) Data theft ✅ C) Intentional data corruption ✅ D) Pop-up advertising Reason: Pop-up advertising can be annoying, but it is not considered a cybercrime.

Computers infected with a virus exhibit many symptoms including which three of the following?

A) OS does not launch properly ✅ B) Your speakers suddenly play "Never Gonna Give You Up" C) Strange error messages or pop-up ads ✅ D) Files get deleted or encrypted ✅

Select all that apply Cyberattacks include which three of the following?

A) Pharming ✅ B) Distributed denial-of-service (DDOS) attacks ✅ C) Hardware theft Reason: Cyberattacks are staged from the Internet. Hardware theft occurs from the stealing of possessed tangible objects. D) Identity theft using a computer or network ✅

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

A) computer worm Reason: A computer worm is usually launched indiscriminately (at a large number of victims) rather than toward a specific individual B) distributed denial of service attack Reason: DDOS attacks are usually launched against corporations or organizations rather than individuals C) antivirus software Reason: Antivirus software seeks to protect you from e-mail viruses. D) e-mail virus ✅

Select all that apply You can change your Firefox settings to allow you to do which three of the following?

A) delete stored cookies automatically when you start Firefox. ✅ B) send cookies to other Firefox users. Reason: You cannot send cookies to other Firefox users. C) approve cookies storage requests. ✅ D) deny cookie storage requests. ✅

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was ____.

spam

Software that illicitly collects information about your Internet surfing habits and behaviors is called ___.

spyware

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber _____.

terrorist

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___. An army of these are used to launch denial of service (DoS) attacks.

zombie

Match the following terms to their correct definition. 1) Phishing 2) Ransomware 3) Keystroke-logging Trojan

1) Tricks users into revealing usernames and passwords by appearing legitimate. 2) When activated, encrypts files on user hard drive and then sells a decryption program. 3) When activated, saves all keystrokes for subsequent transmission to virus creator.

Select all that apply Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

A) Access control ✅ B) Encryption ✅ C) Authentication ✅ D) Antivirus software Reason: Antivirus software protects systems from malware, but is not specifically designed for confidentiality.

Select all that apply Which of the following three statements are true regarding keystroke loggers?

A) Software-based keystroke loggers can be installed by Trojans without the user's knowledge. ✅ B) Keystroke loggers cannot be used to monitor employees. Reason: Organizations often install keystroke loggers to monitor user's behavior. C) Can be hardware devices and software applications. ✅ D) Keystroke loggers can record passwords and confidential information. ✅

Adware often accompanies downloaded _____.

A) e-mail B) images C) video D) programs ✅

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ___.

email

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ___.

hacker

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .

ransomware

Match the following terms to their proper description. 1) Firewalls 2) Anti-virus programs 3) Anti-malware apps

1) Help protect against worms and hackers: Firewall programs help protect against worms and hackers. 2) Help protect against viruses: These programs help to protect your system from a variety of virus threats. 3) Help protect against malware: These apps help protect against a variety of malicious programs.

Matching Question Match the following terms about web cookies to their proper description. 1) Web cookie 2) First-party cookie 3) Third-party cookie

1) Small text file of information created by websites you visit that your web browser stores on your hard disk: 2) Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session 3) Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Categorize the following as either virus symptoms or ways to catch a computer virus (two in each category). 1) Virus symptoms 2) Ways to catch a computer virus

1) Virus symptoms: * The operating system does not launch properly * Critical files are deleted automatically 2) Ways to catch a computer virus: * Finding a thumb drive and then using it in your laptop * Downloading files from questionable Internet sites

Categorize the items as ways to avoid or catch a computer virus (two in each category). 1) Ways to avoid a computer virus 2) Ways to catch a computer virus

1) Ways to avoid a computer virus: * Adjust your web browser's security settings to allow browsing only on trusted sites. * Surf the web and download content safely. 2) Ways to catch a computer virus: * Opening suspicious or infected e-mail messages. * Visiting questionable websites.

Select all that apply Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.

A) Appropriately encrypting data. Reason: Encryption ensures data integrity and confidentiality, but does not ensure that data are available when needed. B) Storing data on multiple hard drives. ✅ C) Ensuring that the data server has an appropriate amount of bandwidth. ✅ D) Having standby equipment available to take over in a situation where the main system fails. ✅

Select all that apply When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

A) Authentication ✅ B) Access control ✅ C) Physical security Reason: This answer should not be selected. Physical security of data is not a result of deactivating a former employee's username and password. D) Encryption Reason: This answer should not be selected. Encryption occurs when data are converted to a code to prevent unauthorized access; this does not occur by deactivating a username and password.

Select all that apply An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

A) Computer ✅ B) Universal serial bus (USB) device Reason: Internet filters are installed on network routers, computers, and servers. C) Server ✅ D) Router ✅

Which of the following are widely used tactics that can keep you safe on the Web?

A) Consider using a VPN ✅ B) Use a debit card rather than a credit card when making online purchases. C) Use your browser's private browsing mode. ✅ D) Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS. ✅

Select all that apply Rootkits are typically used to allow hackers to do which two of the following?

A) Create backdoors ✅ B) Install drivers Reason: Rootkits are not used to install drivers. Drivers are small programs that allow for the interface between device and computer. C) Install rogue files ✅ D) Encrypt files Reason: Rootkits are not known to encrypt files.

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

A) DDoS or DoS ✅ B) worm Reason: A worm is destructive program that replicates itself throughout a single computer or across a network. C) zombie Reason: A zombie is a computer that is under the control of another user. D) virus Reason: A virus is software that infects computers and networks. A DoS attack is designed to interrupt or stop network traffic by flooding it too many requests.

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

A) Data Reason: Data cookies are not part of the discussion about persistent cookies. B) Session Reason: Session cookies determine the start and end of a session, analyze and measure web traffic, and determine the web browser being used. C) Database Reason: Database cookies are not part of the discussion about persistent cookies. D) Persistent ✅

Select all that apply Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

A) Data are regularly backed up. ✅ B) Hard copies of all important datasets are kept in a locked warehouse. Reason: Maintaining and accessing hard copies of all important data would likely be impractical. However, even if this could be done, it would not guarantee that the stored data were real and accurate. C) Data correction codes are used to ensure the data retrieved are the same as when it was stored. ✅ D) Data input is completely automated. Reason: Properly training employees with system access on data entry and upload protocols can ensure data integrity.

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

A) DoS Reason: DoS stands for Denial of Service and is an attack on a network. B) malware Reason: Malware is software that negatively impacts your computer. All Trojans are malware, but not all malware are Trojans. C) Trojan ✅ D) worm Reason: A worm is a destructive program that replicates itself throughout a single computer or across a network.

Select all that apply According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

A) During an acquisition, logistics data are securely transferred to the acquiring company's servers. ✅ B) Access to important data is limited so that only certain employees are able to modify that data. ✅ C) The source spreadsheets containing the sales data for each region are made available to all employees. Reason: Making such data widely available increases the likelihood that an unauthorized person will access and compromise it, or that an authorized person will accidently change the information in the spreadsheet. D) A company has a long-standing policy to disable the usernames and passwords for executives after their employment has ended, but not for lower level employees who have left the company. Reason: All employees need to have their access to systems terminated after their employment has ended; without this, data integrity cannot be confirmed.

Select all that apply Which three of the following statements are true about spyware?

A) Installed via free downloads or by visiting certain illegitimate websites. ✅ B) Causes your computer to shutdown or restart itself. C) Includes the collection of keystrokes, passwords, and confidential information ✅ D) Collects information about your Internet surfing habits and behaviors. ✅

Which two of the following can help prevent a virus infection?

A) Leave your universal serial bus (USB) storage devices plugged in when you boot your computer. Reason: It is a good idea to remove USB storage devices when you boot your computer. B) Use an old and trusted router. Reason: It is a good idea to replace your router every few years to ensure you have the latest hardware and software. C) Never bypass your browser's built-in security features. ✅ D) Adjust your web browser's security settings to allow browsing only on trusted sites. ✅

Select all that apply Select two true statements about packet sniffers.

A) Legitimate sniffers are used for routine examination and problem detection. ✅ B) Packet sniffers use viruses to capture data packets. Reason: Packet sniffers do not operate in the same way as viruses. C) Unauthorized sniffers are used to steal information. ✅ D) Packet sniffers are relatively easy to detect. Reason: Packet sniffers can be very difficult to detect

Select all that apply Which of the following three statements are true about Trojan malware?

A) Often found attached to free downloads and apps. ✅ B) Often used to find passwords, destroy data, or to bypass firewalls. ✅ C) Trojan malware is the same as a macro virus. D) Similar to viruses, but do not replicate themselves. ✅

Select all that apply Persistent cookies store information about which two of the following?

A) Operating system (OS) configuration Reason: Persistent cookies store information regarding a user's browser preferences, username and password information. They do not store information regarding OS configurations. B) User preferences ✅ C) Utility programs Reason: Utility programs are designed to complete maintenance type tasks. Persistent cookies do not store information about utility programs. D) Password and username information ✅

Which three of the following statements are true regarding passwords and passcodes?

A) Passwords identify the authenticity of the user Reason: Passwords only identify the authenticity of the password, not the user. B) The terms passcode and key are synonymous for password ✅ C) Keys are often generated by encryption software or by the vendor who produced the software ✅ D) Passwords can be used to secure computers, networks, software, personal accounts, and digital devices ✅

Select all that apply Which of the following two statements best describe phishing?

A) Phishing scams use viruses to attack computers and steal information. B) Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. ✅ C) Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank. ✅ D) Phishing scams usually cause problems with keyboards.

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

A) Settings ✅ B) Extensions Reason: The Extensions menu allows you to add needed plug-ins. C) Favorites Reason: The Favorites menu allows you to view and edit your favorites (bookmarks). D) Developer tools Reason: The Developer tools menu allows you to see the HTML and CSS code, a debugger, and other options.

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

A) cyber-intruders Reason: Cyber-intruders invade a computer, but do not necessarily modify or alter the operations of a computer or network. B) Cyber-defense Reason: Cyber-defense involves protecting computer systems. C) cyber-threats Reason: Cyber-threats include any threat to a computer that comes from the Internet or Web. D) cyberattacks ✅

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

A) cyberattacker Reason: A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. B) hacker Reason: A hacker attempts to access networks or computers without authorization. A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. C) script kiddie Reason: A script kiddie uses scripts obtained through YouTube or other means to try to hack into networks. D) cyberterrorist ✅

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

A) cybercrime ✅ B) cyberattack Reason: Cybercrime is a crime in which a computer is the object of the crime or is used to commit a criminal offense. A cyberattack is an attempt by hackers to damage a computer network. C) cyberstalking Reason: Cybercrime is a crime in which a computer is the object of the crime or is used to commit a criminal offense. Cyberstalking is a type of cyberbullying that involves maliciously following an individual using the Internet or other electronic means. D) cyberbullying Reason: Cybercrime is a crime in which a computer is the object of the crime or is used to commit a criminal offense. Cyberbullying is using the Internet to send intimidating or threatening messages.

Select all that apply There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

A) deleting cookies. ✅ B) creating the third-party cookies. Reason: You cannot create the third-party cookies in this area in Google Chrome. The third-party cookies are created by websites. C) blocking/allowing cookies by default. ✅ D) making exceptions for cookies from specific websites or domains. ✅

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

A) malware Reason: Malware is malicious software. B) content Reason: While it filters content, it is called an Internet filter. C) safety Reason: An Internet filter is firewall software used to block a user's access to specific Internet content. D) Internet ✅

A group of compromised computers controlled by a hacker is called a _____.

A) netsys B) botweb C) botnet ✅ D) coven

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____.

A) password ✅ B) signature Reason: A signature is used as an identifier but is not necessarily secret. C) biometric Reason: Biometric means life measure. Biometric measures include retinal and fingerprint scanning and face recognition. D) validation Reason: Validation is used to compare a given password to the password on file.

Select all that apply Select 3 ways in which computer virus commonly infect vulnerable digital devices.

A) sharing an infected file ✅ B) running anti-virus software Reason: Maintaining and running anti-virus software is a good way to reduce your computer's vulnerability to attack. C) opening an infected e-mail attachment ✅ D) inserting and opening an infected thumb drive ✅

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

A) snoop Reason: Snooping is the illicit collection of data. B) trespasser Reason: A trespasser enters property without authorization. C) hacker ✅ D) spammer Reason: A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data.

Select all that apply Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

A) viruses Reason: Spyware does not collect information about viruses. Antivirus software collects this type of information. B) account numbers ✅ C) keystrokes ✅ D) passwords ✅

Stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page.

session

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers


संबंधित स्टडी सेट्स

CCNA1 Practice Final Exam:: Full set

View Set

The United States Constitution-Article 3

View Set

Chapter 16 Conquest of the Far West MC (pg 431-442)

View Set

Social Studies 7-12 Practice Exam missed questions

View Set