Ch.5 security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which two of the following are true about script kiddies?

1. Amateur computer hackers with little programming expertise. 2. Illegally gain access to computer systems using programs (scripts) that others have written.

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari.

1. Choose safari 2. click preferences 3. click Privacy 4. Change cookie setting

Which three of the following you should consider in the settings area of each browser?

1. Deleting cookies 2. Blocking or customizing your cookie settings 3.Decide from which sites you want to allow cookies

Select three true statements regarding persistent cookies.

1.Collect information about user preferences. 2.Collect password and username information. 3.Collect information about the Internet protocol (IP) Address.

Ways to avoid a computer virus

1. Adjust your web browser's security settings to allow browsing only on trusted sites. 2.Surf the web and download content safely.

Which of the following are online nuisances?

1. Spam 2. Spyware 3. Spoofing

You can change your Firefox settings to allow you to do which three of the following?

1.deny cookie storage requests. 2.delete stored cookies automatically when you start Firefox. 3.approve cookies storage requests.

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black Hat Hacker

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Button 4

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

A virus written in a specific language and placed within a document or spreadsheet is called a----- virus.

Macro

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Strange error messages or pop-up ads Files get deleted or encrypted

digital Identity

Online search activities Purchasing behavior Social media postings

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Which of the following organization you should contact if you receive a phishing message?

US-cert

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

International laws on Internet privacy are very similar.

false

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A virus written in a macro language and placed within a document or spreadsheet is called a ....

macro virus

Typically computer viruses must be _____ to attack and do damage to a digital device.

open and run

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Software programs that hide in the operating system and allow for the installation of hidden files are called

rootkit

Stored in temporary memory, ---- cookies are used to analyze and measure traffic on a web page.

session

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

setting

Most e-mail applications, such as Gmail and Outlook, provide robust ---- filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam (filter)

The main governmental organization that oversees Internet privacy in the United States is the Federal --- Commission

trade

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

trojan

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called----hat hackers.

white

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at------a company better known for its search engine and its Pixel series smartphones.

google

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

Human knowledge and ideas that the law protects against unauthorized use by others is considered --- property

intellectual

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

Safari accept cookies and website data from which of the following?

only websites you vist

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

Select all that apply Cyberattacks include which three of the following?

pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

Unsolicited e-mail is __.

spam

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

true

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

Internet (privacy)

Select two true statements about packet sniffers.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

Literary works Music Pictures

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

Pharming

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk:

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

White-hat hackers

Internet Privacy

Who has access to data and information How data and information is used Techniques and technologies used to protect sensitive data and information

Ways to catch a computer virus

1.Opening suspicious or infected e-mail messages. 2.Visiting questionable websites.

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

false

Adware often accompanies downloaded _____.

Programs

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

open an advance menu

To delete cookies in Safari, click ___.

Preferences

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

A group of compromised computers controlled by a hacker is called a _____.

botnet

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phin

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

ransomware phishing keystroke logging Trojan

A type of malware that is triggered each time you boot your computer is called a

rootkit or kit

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a __ filter.

spam

Which of the following two statements best describe phishing?

1.Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. 2.Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

a---hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an--- nuisance.

online

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ------ kiddies.

script

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Put the following steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site 2. An action such as running or opening the file triggers the virus 3. The payload is activated and the virus starts its destructive actions.

If you believe you have fallen victim to a phishing scam you should:

1.contact the institution the message was allegedly sent from. 2.contact US-CERT.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

first-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Persistent cookies store information about which two of the following?

1. password and username information 2. User preferences

Which three of the following may be indications that your system has been hacked?

1.Fake e-mails or social media messages in your account 2.Redirected Internet searches 3.Unwanted browser toolbars

Specialized hardware or software that capture packets transmitted over a network are called packet

Sniffer or Sniffers

A program that appears legitimate, but executes an unwanted activity when activated is called ----- a horse virus.

Trojan

You need to adjust cookie and data permission settings in Google Chrome. Put the following steps in the correct order for adjusting cookie and site data permission settings in Google Chrome.

1. click the chrome menu on the browser toolbar then select settings 2. click show advanced settings. in the "privacy' section, click the content settings button 3. in the "Cookies" section change the desired cookies setting

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

1. making exceptions for cookies from specific websites or domains. 2.deleting cookies. 3.blocking/allowing cookies by default.

Which of the following are symptoms of an online nuisance attack?

1.Pop-up start appearing after you visit unfamiliar sites. 2.Receiving a lot of spam messages or bounced back e-mail messages. 3.Frequent pop-ups while searching the web or working in programs

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

Email

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

Harming or harassing via information technology and networks in a repeated and deliberate manner is called

Cyberbullying

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

1. Contact the via the phone number listed on the US-CERT site. 2.In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected].

Select all that apply What are the two common symptoms of a computer virus?

Programs launch on their own Documents will not save

Select three privacy risks associated with cookies.

1. Websites using cookies can collect your information and sell it to third parties. 2. Corporate and government entities can track your web behavior. 3.Websites can track your surfing behavior and create a profile.


संबंधित स्टडी सेट्स

Exam 3: Chapter 12: Abuse and Violence

View Set

Statistics Ch. 2 - Organizing and Summarizing Data

View Set

Chapter 44 - Problems of the Peripheral Nervous System

View Set

Chapter 1 - 1.7 A Simple Java Program

View Set

Priority Setting Framework (Adv)

View Set

Chapter 28 Homework: The Reproductive System

View Set

Section 2 Unit 2: Market Efficiency

View Set