Computer Security Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Factors that damage computer hardware include?

Power surges, Overheating, Humidity, Magnetic fields

Which of the following are online annoyances?

Spam, Spyware, Spoofing

A damaging program duplicating itself on a single computer or over a network is called a _____________.

Worm

Firewalls help protect against _______________ and _______________.

Worms and hackers

An unwelcome e-mail message is called __________.

spam

One of the main differences between free and free-based antivirus software is _______________.

the number of features

Select what is true about session cookies.

Determine the start and end of a session, Analyze and. measure traffic on a web page, Determine the web browser being used

A person with unlawful access to networks to steal and corrupt information and data is called a ________________.

Hacker

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP Address

Cyberattacks include ______________ and ________________.

Identity Theft and DDoS Attacks

Rootkits enable a remote user to do which of the following?

Install rogue files, Create backdoor programs, Delete files

Firewall software used to block Internet-specific content of a user is called an _________ filter.

Internet

What is true about packet sniffers?

Legitimate sniffers are used for routine examination and problem detection, Unauthorized sniffers are used to steal information

Common computer virus infection indicators include ______________, ______________, and ______________.

OS doesn't launch properly, Files get deleted or encrypted, Strange error messages or pop-up ads

In each browser's settings area you should consider ______________, _______________, and _______________.

Periodically deleting cookies, Blocking/customizing your cookie settings, Decide from which sites you want to allow cookies

Sometimes spam messages are referred to as ____________.

UBE

Choose what is true about cookie privacy risks.

Websites using cookies can collect your information and sell it to third parties, Websites can track your surfing behavior and create a profile, Corporate and government entitles can track your web behavior

Identify what is true about script kiddies.

Are amateur computer hackers with little programming expertise, Illegally gain access to computer systems using programs (scripts) that others have written

A virus signature is the software ____________ of a particular computer virus.

Code


संबंधित स्टडी सेट्स

PrepU Resp AH, MedSurg Chapter 21 Respiratory Care Modalities, Ch 21 - Respiratory Care Modalities, Ex. 4-Ch. 21 (Med Surg) Resp. Care Modalities

View Set

Ch. 26 Documentation and Informatics

View Set

Acute myocardial infarction (PEARLS): Non-ST-Segment Elevation MI, ST-Segment Elevation Myocardial Infarction (Smarty PANCE)

View Set

Adult/Child/Baby First Aid/CPR/AED

View Set

Regulations and Standards IAHCSMM - Ch 5

View Set