com tech week 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which area of the Control Panel screen in Windows allows you to adjust Parental Controls?

3

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called kiddies.

Blank 1: script

Stored in temporary memory, ______ cookies are used to analyze and measure traffic on a web page

Blank 1: session

This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?

Button 4

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Which three of the following you should consider in the settings area of each browser?

Deleting cookies Blocking or customizing your cookie settings Decide from which sites you want to allow cookies

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

Which component of a network designed to prevent unauthorized Internet intrusions?

Firewall

Match the following terms to their proper description. Instructions

Firewalls matches Choice Help protect against worms and hackers: Firewall programs help protect against worms and hackers. Anti-virus programs matches Choice Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats. Anti-malware apps matches Choice Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

Cyberattacks include which three of the following?

Identity theft using a computer or network Distributed denial-of-service (DDOS) attacks Pharming

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

NAT (Network Address Translation)

Safari accepts cookies and website data from which of the following?

Only from websites you visit

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Packet filters Proxy servers

Persistent cookies store information about which two of the following?

Password and username information User preferences

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Which three of the following are factors to consider to help protect the hardware of your digital device?

Protecting a digital device from magnetic fields Protecting a digital device from overheating Protecting a digital device from humidity

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

Proxy

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Router Computer

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

Which two of the following statements are true regarding firewalls?

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems

Where do you click to adjust cookie settings in Edge? (Drag the correct response to the empty box)

To adjust cookies in Edge, where would you click first? matches Choice The 3-dot "Settings and more" icon

Wyatt needs a password for his school's e-mail system. Which password is the most secure?

Xj9%ft7

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device

hardware

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I

password

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

Do you know when you are at risk?

An attack using a computer is a ___. matches Choice cyberattack

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

Which three of the following statements are true regarding passwords and passcodes?

Keys are often generated by encryption software or by the vendor who produced the software The terms passcode and key are synonymous for password Passwords can be used to secure computers, networks, software, personal accounts, and digital devices

Which three of the following settings can you restrict in the Mac OS?

Limit access to specific websites Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

Blank 1: hacktivism or hacktivist

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. approve cookies storage requests. delete stored cookies automatically when you start Firefox.

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Harming or harassing via information technology and networks in a repeated and deliberate manner is called

Blank 1: cyberbullying, bullying, cyber bullying, cyberattack, or cyber attack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

Blank 1: cyberattack, cyber attack, cybercrime, or cyber crime

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Which three of the following are considered cybercrimes?

Intentional data corruption Data theft Cyberbullying

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network Translation provides a type of firewall protection by hiding internal IP addresses.

Blank 1: address or Address

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database

Blank 1: administrator, DBA, or administrators

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

Blank 1: cyberterrorist, cyber terrorist, cyber-terrorist, or terrorist

Rootkits are typically used to allow hackers to do which three of the following?

Install rogue files Create backdoors Encrypt files

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

Select three privacy risks associated with cookies.

Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile.

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

Blank 1: hacker, cyberhacker, cracker, black hat hacker, or cyber hacker

Which of the following are the usual tasks of information systems (IS) security managers?

Creates and implements an organization's IS security measures Responsible for keeping an organization's Wi-Fi network secure

Where do you click to delete cookies in Safari? (Drag the correct response to the empty box)

To delete cookies in Safari, click ___. matches Choice Preferences

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Which three of the following may be indications that your system has been hacked?

Unwanted browser toolbars Redirected Internet searches Fake e-mails or social media messages in your account

Do you know when you are at risk? (Drag the correct response to the empty box)

When a computer is used to commit a crime it is considered a ___. matches Choice cybercrime

Match the following terms about web cookies to their proper description.

Web cookie matches Choice Small text file of information created by websites you visit that your web browser stores on your hard disk: First-party cookie matches Choice Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session Third-party cookie matches Choice Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy


संबंधित स्टडी सेट्स

Behavioral Sciences - Psych/Soc: Key Neurotransmitters

View Set

Chapter 11 Detection and Identification of Microorganisms

View Set

Microbiology ~ Unit 4 (chapters 13, 14, 15, and 19)

View Set

Chapter 4 - Hacking & Computer Security

View Set

Chapter 4: Treatment Settings and Therapeutic Programs

View Set

METHODS OF SUBORDINATION: PART IV

View Set

Civilizations in North and South America

View Set