COMP 3
What are three functions of session cookies
- analyze and measure traffic on a web page - determine the start and end of a session - determine the web browser being used
stayin safe on the wil' web
- consider using a VPN - use your browser's private browsing. mode - make sure the sites you visit use HTTPS if entering personal info
Which three of the following may be indicators that your system has been hacked
- fake emails or social media messages in your account - unwanted browser toolabrs - redirected internet searches
What is true about firewalls
- having more than one firewall app on your computer may cause conflicts and other problems - the Mac OS includes firewall protection
antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are
- heuristic-based detection - signature-based detection
Which format is best for all spreadsheet programs to access
CSV
A hacker launches an attach on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a ____ attack
DDoS, or DoS
DDoS
Distributed Denial of Service
spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services
UBE
on chrome settings menu to adjust cookie and site data permissions you go to which setting
advanced
Facebook displaying adds based on someones personal profile and browsing history is an online nuisance called
adware
Persistent cookies
collect information about the Internet Protocol (IP) Address - collect password and username information - collect info about user preferences
small text files created by websites you visit that your web browser stores on your hard disk are called what?
cookies
An attack using a computer is a _____
cyberattack
a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a
cyberterrorist
a spear-phising attack is a phising attack that targets a specific individual. This is commonly launched with a ___ ___
e-mail virus
often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a _______
which component of a network designed to prevent unauthorized Internet intrusions
firewall
Juan attempts to gain unauthorized access to networks. Juan would be considered a ____
hacker
Creating a fake webpage to track victims into divulging personal info is a type of phishing known as
pharming
the type of phising that seeks to obtain personal info through malicious software that is inserted on victims computers and directs them to a fake webpage is called
pharming
What type of cookie is stored in temporary memory and is lost when the web browser is closed
session
stored in temporary memory, ____ cookies are used to analyze and measure traffic on a web page.
session
Third-party cookie
small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invaision of privacy
first-party cookie
small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Often accompanying downloaded apps a program that appears to be legitimate but executes an unwanted activity when activated, is called a
trojan
a program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus
trojan
Privacy risks associated with cookies
websites using cookies can collect your information and sell it to third parties - corporate and gov entities can track your web behavior - websites can track your surfing behavior and create a profile
Cyberattacks include which three of the following
- identity theft using a computer or network - pharming - distributed denial-of-service (DDOS) attacks
True statements about fee-based (subscription-based) and free antivirus software programs
- most fee-based software comes with technical support - one of the positives of free antivirus software (other than the cost) is their historicaly strong malware detection performance. CHECK
When a computer is used to commit a crime it is considered a _____
cybercrime
Which three of the following are considered cybercrimes?
data theft, cyberbullying, intentional data corruption
firewall software used to block a user's access to specific Internet content is called a _____ filter
internet
Which three of the following are well-known e-mail attacks
phising, ransomware, keystroke-logging trojan
Web cookie
small text file of information created by websites you visit that your web broser stores on your hard disk
free-based antivirus software often provides more features than free anti-virus
software, YEA
unsolicited email from unknown sender is
spam
makes it easy to arrange, display, and calculate numerical data
spreadsheet programs
color _____ attempts to describe how colors convey feeling. It also describes the way most people perceive messages through color
theory
software that infects computers and is creating using computer code is called a computer ___
virus
One of the risks with cookies is ___
websites using cookies can collect your information and sell it to third parties
firewall programs help protect against
worms and hackers
Cookie Settings in Google Chrome
- blocking/allowing cookies by default - making exceptions for cookies from specific websites or domains - deleting cookies
Persistent cookies store information about which two of the following
- user preferences - password and username information
Which three of the following you should consider in the settings area of each browser
- blocking or customizing your cookie settings - decide from which sites you want to allow cookies - deleting cookies
An internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on what?
Router, Server, Computer
computer software that is designed to prevent spam messages from entering into a user's email inbox is called a ____ filter
spam