CGS Computer security
dentify what is true about script kiddies.
Script kiddies illegally gain access to computer systems using programs (scripts) other have written and are usually amateur computer hackers with little programming expertise.
Which of the following are online annoyances?
Spam, spyware, and spoofing are online nuisances.
Common malware types include
Trojan horses, worms, and viruses.
Sometimes spam messages are referred to as ________.
UBE
Websites that use cookies can collect information about
Websites that use cookies can collect information about a user's surfing habits, monitor web behavior, and sell that information to third parties.
f you believe you have fallen victim to a phishing scam, which two should you do right away?
contact US-CERT and contact the institution the message was allegedly sent from.
The malevolent use of computer code to change a computer or network's normal operations is called a ________.
cyberattack
Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?
cyberbullling
Which of these would be deemed a cybercrime?
data manipulation
Specialized hardware or software that capture packets transmitted over a network are called packet ________.
sniffers
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.
IP adress
Which of these would be considered a cybercrime?
Internet scams, cyber espionage, and information theft are all considered cybercrimes.
A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.
cybercrime
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.
cyberterriost
Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.
pharming
Rootkits enable a remote user to do which of the following?
expect for install drivers
A virus signature is the software ________ of a particular computer virus.
code
Put the steps of a virus infection in the correct order.
1) The virus arrives via e-mail attachment, file download, or by visiting an infected site 2)An action such as running or opening the file triggers the virus. 3)The infection is spread to other devices or a network. 4)The payload is activated and the virus starts its destructive actions.
What order of steps should you take to change your cookie preferences in Safari?
1) choose safari 2) click preferences 3) click privacy 4) change cookie settings
Avoiding viruses include all the following except
bypass your browser's built-in security.
Breaking into a computer system (hacking), for politically or socially purposes is called ________.
hacktivism
Malware is designed to do all the following except
improve data
In each browser's settings area you should consider ________, ________, and ________.
other than adjusting your firewall settings
Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.
persistent
Cookies stored on a computer store information about ________.
user preferences
Software that infects a computer and is created by computer code is called a ________.
virus
A damaging program duplicating itself on a single computer or over a network is called a ________.
worm
Which of the following are treated as cybercrimes?
-data manipulation -cyberbullying -data corruption
What is true of the malware Trojan horse?
-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls
What is the best way (order of steps) to customize cookie settings?
1)Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2)Tap or click the Tools button Tools, and then tap or click Internet options. Tap or click the Tools button Tools, and then tap or click Internet options. 3)On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default.
Firewalls help protect against ________ and ________.
Firewalls help protect against worms and hackers.
Cyberattacks include the following
Cyberattacks include spyware, pharming, phishing, spamming, spoofing, DoS, and DDoS attacks to name a few.
A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.
DDoS
The acronym DDoS stands for ________.
Distributed Denial of Service
Factors that damage computer hardware include?
Factors that damage computer hardware include magnetic fields, humidity, power surges, and overheating.
In the Firefox, the best steps to clear the browser cookies is to
1)Click the Menu button, choose History, and then Clear Recent History. 2)Once you have cleared recent History you should set the time range to clear Everything. 3)Click on the arrow next to Details to expand list of History items. 4)Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.