Computer Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Choose what is true about cookie privacy risks. -Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior. -Hackers can use cookies to launch attacks on your computers.

- -Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.

If you believe you have fallen victim to a phishing scam, which two should you do right away? - Contact the institution the message was allegedly sent from. -Contact US-CERT. -Contact your ISP. -Contact the person or organization who sent the message.

- Contact the institution the message was allegedly sent from. -Contact US-CERT.

Cyberattacks include ________ and ________. - DDoS attacks - email spam - identity theft - hardware theft

- DDoS attacks - identity theft

What is true about packet sniffers? - Legitimate sniffers are used for routine examination and problem detection. -.Unauthorized sniffers are used to steal information. - Packet sniffers are relatively easy to detect - Packet sniffers use viruses to capture data packets.

- Legitimate sniffers are used for routine examination and problem detection. -.Unauthorized sniffers are used to steal information.

Identify what is true about script kiddies. - are amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written - have the skill or experience to write their own programs - are usually females between the ages of 30 and 50 Correct

- are amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written

Which of the following are treated as cybercrimes? - data manipulation - data corruption - cyberbullying - pop-up advertising

- data manipulation - data corruption - cyberbullying

What is true of the malware Trojan horse? - found attached to free downloads and apps - often used to find passwords, destroy data, or to bypass firewalls -similar to adware - Trojan malware is the same as a macro virus.

- found attached to free downloads and apps - often used to find passwords, destroy data, or to bypass firewalls

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following? - router or computer - network - keyboard tracker - stand-alone filter attached to a server

- router or computer - network - stand-alone filter attached to a server

Which of the following are online annoyances? - spam - spyware - spoofing - snail mail

- spam - spyware - spoofing

Cyberattacks include the following - spyware - pharming and phishing. - spamming and spoofing. - DoS and DDoS attacks.

- spyware - pharming and phishing. - spamming and spoofing. - DoS and DDoS attacks.

Websites that use cookies can collect information about - surfing habits - selling your collected information to third parties. - monitoring your web behavior - tracking a user's cloud storage.

- surfing habits - selling your collected information to third parties. - monitoring your web behavior

You can minimize your risk of computer damage by using a ________ or a ________. - surge protector - UPS (Uninterruptible Power Supply) - keyboard protector - mouse pad

- surge protector - UPS (Uninterruptible Power Supply) - mouse pad

zombie

- zomputer that has been taken over by a hacker, typically by using a rootkit -used to launch denial of service (DoS) attacks

Rootkits enable a remote user to do which of the following? -Install drivers. -Install rogue files. - Create backdoor programs. -Delete files.

-Install rogue files. - Create backdoor programs. -Delete files.

cyber attack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network

internet filter

Firewall software used to block a user's access to specific Internet content

anti malware apps

Help protect against malware

anti virus programs

Help protect against viruses

firewalls

Help protect against worms and hackers - The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.

ransomware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code

trojan

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated

what are the two common symptoms of a computer virus? Your speakers do not work. Programs launch on their own Documents will not save Your computer will not power on

Programs launch on their own Documents will not save

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Computer Server

adware

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements

spyware

Software that illicitly collects information about your Internet surfing habits and behaviors - keystrokes, account numbers, passwords

virus

Software that infects computers and is created using computer code

sniffer

Specialized hardware or software that capture packets transmitted over a network

Phishing/spoofing

Tricks users into revealing usernames and passwords by appearing legitimate (websites

Sometimes spam messages are referred to as ________. Multiple ChoiceUBEUSBUBMUBB

UBE

denial of service attack

attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests

Keystroke Logger

cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware

worm

damaging program duplicating itself on a single computer or over a network

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) _______________

email

vpn

hides your IP address to outside websites by running your communications through a secure network.


संबंधित स्टडी सेट्स

(BLAw chap 2 *1)CHT4 Business and the Constitution

View Set

A&P II: chapter 28- the reproductive system

View Set

AP G&P - Principles of American Government

View Set

Health Week 1: Ch 1 Taking Charge of Your Health

View Set

Clinical Psychology Final Exam Review

View Set

Chapter 25 assessing the neurological system

View Set

Video Quiz: Family and Medical Leave Act

View Set

SOC-101 Ch. 9 Constructing Gender and Sexuality

View Set

Anthropology Chapter 5 Study Guide

View Set