Computer Security - CGS 2100 Midterm
Choose what is true about cookie privacy risks
Websites using cookies can collect your information and sell it to third parties, Websites can track your surfing behavior and create a profile, Corporate and government entities can track your web behavior
In Internet Explorer (Microsoft Edge), you can set which cookie settings?
allow, delete, block cookies
Choose what is true about computer worms
automatically reproduce, Replication exhausts network bandwidth or available storage, often sent using e-mail attachments
A collection of hacker-controlled computers is called a ________
botnet
A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________
cybercrime
Firewall software used to block Internet-specific content of a user is called an ________ filter
internet
Select what is true about session cookies
determine the start and end of a session, analyze and measure traffic on a web page, determine the web browser being used
Single events and a(n) ________ series of events are two common cybercrime categories
on-going
Factors that damage computer hardware include?
power surges, overheating, humidity, magnetic fields
If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________
quarantine
An unwelcome e-mail message is called ________
spam
A small text file of information created by websites that your web browser stores on your hard drive is called a ________
cookie
Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________
white hat hackers
In each browser's settings area you should consider ________, ________, and ________
periodically deleting cookies, blocking/customizing your cookie settings, decide from which sites you want to allow cookies
Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information
pharming
The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________
cookies
A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic
firewall
Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies
persistant
Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies
persistent
A damaging program duplicating itself on a single computer or over a network is called a ________
worm
Good password management include which three of the following?
Changing your password often, Using strong passwords, Never use the same password twice
What order of steps should you take to change your cookie preferences in Safari?
Choose Safari, Click Preferences, Click Privacy, Change cookie settings
In the Firefox, the best steps to clear the browser cookies is to
Click the Menu button, choose History, and then Clear Recent History, Once you have cleared recent History you should set the time range to clear Everything, Click on the arrow next to Details to expand list of History items., Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window
If you believe you have fallen victim to a phishing scam, which two should you do right away?
Contact the institution the message was allegedly sent from, Contact US-CERT
A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests
DDoS
Cyberattacks include ________ and ________
DDoS attacks, identity theft
The acronym DDoS stands for ________
Distributed Denial of Service
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites
IP address
According to US-CERT, you should contact them using one of the following methods when you receive a phishing message
In Outlook Express, you can create a new message and drag and drop the phishing e-mail into the new message. Address the message to [email protected] and send it, In Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected], If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT
Rootkits enable a remote user to do which of the following?
Install rogue files, Create backdoor programs, Delete files
Cyberattacks include all the following except
Internet browsing
Which of these would be considered a cybercrime?
Internet scams, cyber espionage, information theft
What is true about packet sniffers?
Legitimate sniffers are used for routine examination and problem detection, Unauthorized sniffers are used to steal information
Common computer virus infection indicators include ________, ________, and ________
OS doesn't launch properly, files get deleted or encrypted, strange error messages or pop-up ads
In which order should you delete cookies in Internet Explorer (Microsoft Edge)?
On the Start screen, tap or click Internet Explorer to open Internet Explorer, Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings), Tap or click Options, and then, under History, tap or click Select, Select the Cookies check box, then tap or click Delete
Put the steps of a virus infection in the correct order
The virus arrives via e-mail attachment, file download, or by visiting an infected site, An action such as running or opening the file triggers the virus, The infection is spread to other devices or a network, The payload is activated and the virus starts its destructive actions
Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a ________
Trojan horse
Sometimes spam messages are referred to as ________
UBE
What is true about passwords?
Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be, Regularly check your accounts to ensure they have not been tampered with
A virus signature is the software ________ of a particular computer virus
code
Antivirus software is a computer program used to scan files to identify and remove ________ and ________
computer viruses, other malicious programs
The malevolent use of computer code to change a computer or network's normal operations is called a ________
cyberattack
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________
cyberterrorist
Which of these would be deemed a cybercrime?
data manipulation
Which of the following are treated as cybercrimes?
data manipulation, data corruption, cyberbullying
Trojan horse programs are used to find all of the following except
finding free downloads
A person with unlawful access to networks to steal and corrupt information and data is called a ________
hacker
Breaking into a computer system (hacking), for politically or socially purposes is called ________
hacktivism
Identify what is true about script kiddies
illegally gain access to computer systems using programs (scripts) that others have written, are amateur computer hackers with little programming expertise
Spyware collects your ________, ________, and ________ to gain information about your Internet habits and activities
keystrokes, passwords, confidential information
What type of virus is written in a macro language and placed in a document or table?
macro virus
What is true of the malware Trojan horse?
often found attached to free downloads and apps, often used to find passwords, destroy data, or to bypass firewalls
An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following?
router or user's computer, network, stand-alone filter attached to a server
Specialized hardware or software that capture packets transmitted over a network are called packet ________
sniffers
Which of the following are online annoyances?
spam, spyware, spoofing
Cyberattacks include the following
spyware, pharming, phishing, spamming, spoofing, DoS, and DDoS
Websites that use cookies can collect information about
surfing habits., selling your collected information to third parties, monitoring your web behavior
You can minimize your risk of computer damage by using a ________ or a ________
surge protector, UPS (Uninterruptible Power Supply)
Cookies stored on a computer store information about ________
user preferences
Software that infects a computer and is created by computer code is called a ________
virus
Common malware types include
viruses, worms, trojan horses
Firewalls help protect against ________ and ________
worms, hackers
A hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ________ computer
zombie
A hacker-controlled computer is called a ________
zombie
Cookie settings can be adjusted in Google Chrome many different ways. They include ________, ________, and ________
blocking/allowing cookies by default, deleting cookies, making exceptions for cookies from specific websites or domains