Computer Security - CGS 2100 Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Choose what is true about cookie privacy risks

Websites using cookies can collect your information and sell it to third parties, Websites can track your surfing behavior and create a profile, Corporate and government entities can track your web behavior

In Internet Explorer (Microsoft Edge), you can set which cookie settings?

allow, delete, block cookies

Choose what is true about computer worms

automatically reproduce, Replication exhausts network bandwidth or available storage, often sent using e-mail attachments

A collection of hacker-controlled computers is called a ________

botnet

A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________

cybercrime

Firewall software used to block Internet-specific content of a user is called an ________ filter

internet

Select what is true about session cookies

determine the start and end of a session, analyze and measure traffic on a web page, determine the web browser being used

Single events and a(n) ________ series of events are two common cybercrime categories

on-going

Factors that damage computer hardware include?

power surges, overheating, humidity, magnetic fields

If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________

quarantine

An unwelcome e-mail message is called ________

spam

A small text file of information created by websites that your web browser stores on your hard drive is called a ________

cookie

Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________

white hat hackers

In each browser's settings area you should consider ________, ________, and ________

periodically deleting cookies, blocking/customizing your cookie settings, decide from which sites you want to allow cookies

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information

pharming

The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________

cookies

A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic

firewall

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies

persistant

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies

persistent

A damaging program duplicating itself on a single computer or over a network is called a ________

worm

Good password management include which three of the following?

Changing your password often, Using strong passwords, Never use the same password twice

What order of steps should you take to change your cookie preferences in Safari?

Choose Safari, Click Preferences, Click Privacy, Change cookie settings

In the Firefox, the best steps to clear the browser cookies is to

Click the Menu button, choose History, and then Clear Recent History, Once you have cleared recent History you should set the time range to clear Everything, Click on the arrow next to Details to expand list of History items., Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window

If you believe you have fallen victim to a phishing scam, which two should you do right away?

Contact the institution the message was allegedly sent from, Contact US-CERT

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests

DDoS

Cyberattacks include ________ and ________

DDoS attacks, identity theft

The acronym DDoS stands for ________

Distributed Denial of Service

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites

IP address

According to US-CERT, you should contact them using one of the following methods when you receive a phishing message

In Outlook Express, you can create a new message and drag and drop the phishing e-mail into the new message. Address the message to [email protected] and send it, In Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected], If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT

Rootkits enable a remote user to do which of the following?

Install rogue files, Create backdoor programs, Delete files

Cyberattacks include all the following except

Internet browsing

Which of these would be considered a cybercrime?

Internet scams, cyber espionage, information theft

What is true about packet sniffers?

Legitimate sniffers are used for routine examination and problem detection, Unauthorized sniffers are used to steal information

Common computer virus infection indicators include ________, ________, and ________

OS doesn't launch properly, files get deleted or encrypted, strange error messages or pop-up ads

In which order should you delete cookies in Internet Explorer (Microsoft Edge)?

On the Start screen, tap or click Internet Explorer to open Internet Explorer, Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings), Tap or click Options, and then, under History, tap or click Select, Select the Cookies check box, then tap or click Delete

Put the steps of a virus infection in the correct order

The virus arrives via e-mail attachment, file download, or by visiting an infected site, An action such as running or opening the file triggers the virus, The infection is spread to other devices or a network, The payload is activated and the virus starts its destructive actions

Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a ________

Trojan horse

Sometimes spam messages are referred to as ________

UBE

What is true about passwords?

Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be, Regularly check your accounts to ensure they have not been tampered with

A virus signature is the software ________ of a particular computer virus

code

Antivirus software is a computer program used to scan files to identify and remove ________ and ________

computer viruses, other malicious programs

The malevolent use of computer code to change a computer or network's normal operations is called a ________

cyberattack

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________

cyberterrorist

Which of these would be deemed a cybercrime?

data manipulation

Which of the following are treated as cybercrimes?

data manipulation, data corruption, cyberbullying

Trojan horse programs are used to find all of the following except

finding free downloads

A person with unlawful access to networks to steal and corrupt information and data is called a ________

hacker

Breaking into a computer system (hacking), for politically or socially purposes is called ________

hacktivism

Identify what is true about script kiddies

illegally gain access to computer systems using programs (scripts) that others have written, are amateur computer hackers with little programming expertise

Spyware collects your ________, ________, and ________ to gain information about your Internet habits and activities

keystrokes, passwords, confidential information

What type of virus is written in a macro language and placed in a document or table?

macro virus

What is true of the malware Trojan horse?

often found attached to free downloads and apps, often used to find passwords, destroy data, or to bypass firewalls

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following?

router or user's computer, network, stand-alone filter attached to a server

Specialized hardware or software that capture packets transmitted over a network are called packet ________

sniffers

Which of the following are online annoyances?

spam, spyware, spoofing

Cyberattacks include the following

spyware, pharming, phishing, spamming, spoofing, DoS, and DDoS

Websites that use cookies can collect information about

surfing habits., selling your collected information to third parties, monitoring your web behavior

You can minimize your risk of computer damage by using a ________ or a ________

surge protector, UPS (Uninterruptible Power Supply)

Cookies stored on a computer store information about ________

user preferences

Software that infects a computer and is created by computer code is called a ________

virus

Common malware types include

viruses, worms, trojan horses

Firewalls help protect against ________ and ________

worms, hackers

A hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ________ computer

zombie

A hacker-controlled computer is called a ________

zombie

Cookie settings can be adjusted in Google Chrome many different ways. They include ________, ________, and ________

blocking/allowing cookies by default, deleting cookies, making exceptions for cookies from specific websites or domains


संबंधित स्टडी सेट्स

Intro to Bus MGT1 Book Questions 11-

View Set

3.2 China - Types and Forms of Power

View Set

Pharmacology Chapter 3 Toxic Effects of Drugs

View Set

Time is an important variable in many psychological concepts. Describe a specific example that clearly demonstrates an understanding of each of the following concepts and how it relates to or is affected by time. Use a different example for each concept.

View Set

Bien Dit 1: Chap 4B School Supplies

View Set