INFO 160 chapter 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

logical ports

The term _____ refers to malicious software, such as viruses, adware and spyware

malware

is software that has a malicious intent.

malware

packet filtering

method for selectively allowing certain requests to access a port

these are all important protective measures for preventing viruses EXCEPT ________.

not using wi-fi hotspot

Emptying the Recycle Bin should be done ________.

only after you have determined that you no longer need any of the files that you have deleted

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

packet filter

A(n) ________ is a program that analyzes the contents of data packets on a network.

packet sniffer

A firewall designed specifically for home networks is called a ________ firewall.

personal

____ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.

pharming

Which of the following virus types changes its own code to avoid detection?

polymorphic

____ are new browser windows launched by a website.

popups

Adware displays promotional items on user computers.

true

pop-up blocker

utility to stop extra Internet browser windows from opening

The following are basic functions that adware and spyware generally perform EXCEPT ________.

virus protection

Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

white-hat hacker

All of the following are TRUE of virus protection software packages EXCEPT ________.

you can only scan the entire computer each time you perform a scan

ShieldsUP and LeakTest are software programs you can use to test whether ________.

your firewall is working correctly

________ floods a computer with requests until it shuts down denying access to legitimate users.

A DoS attack

zombie

a computer controlled by a hacker

packet sniffer

a program that examines the contents of all network traffic

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

a trojan horse

polymorphic virus

a virus that changes its own code to avoid detection

An unusual advertisement on your computer screen that pops up is usually caused by ________.

adware or spyware

If you regularly use a program which uses useful pop-ups, you can ____ them for that site in Internet properties Pop-up blocker settings

allow

restore point

an exact copy of your hard drive

Trojan Horse

appears to be useful but does something malicious in the background

multipartite virus

attempts to infect computers through multiple methods

worm

attempts to travel between systems through network connections to spread an infection

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) _____ program.

backdoor/rootkit

Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

black-hat hacker

A large group of software programs that runs autonomously on zombie computers is called a(n) ___

botnet

adware & spyware

can perform some types of tracking, such as recording your surfing habits

Backing your work up to a(n) ________ is more secure than using an external hard drive.

cloud storage location

the most common occurrence of identity compromise is through ________.

data breaches of a company that stores your information

The practice of advertisers using software that gathers personal information about you is called ________.

data mining

All of the following pose a threat to your computer EXCEPT ________.

defensive computing

You would use Windows Action Center to check all of the following EXCEPT ________.

display settings

Attacks that are launched from multiple zombie computers at the same time are called ________.

distributed denial-of-service attacks (DDoS)

backup

duplicates files and programs on your hard drive

The desktop version of ____ has an option to turn its popup blocker off and on.

edge

A backdoor program is an app that appears to be useful to you, but does something malicious.

false

A keystroke logger allows hackers to take control of your computer.

false

All pop-ups are malicious.

false

When you delete files from your hard drive in Windows, they are permanently removed from your computer

false

Windows Action Center can only be used to troubleshoot computer problems.

false

Windows Defender is an add-on antivirus software package available as a subscription.

false

A good way to keep hackers out of a computer is to install a(n)

firewall

All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

first name

data mining

gathers personal information about you

botnet

group of software programs that usually run independently on a large number of zombie computers

Anyone who breaks into a computer system is known as a

hacker

firewall

hardware or software for protecting computers from hackers prevents intrusion into your computer

Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

identity theft

is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.

identity theft

antivirus program

prevents unwanted, malicious programs from being installed on your computer

Setting a system restore point should be done ________.

prior to installing new software

packet sniffer

program used by hackers to look at individual packets as they travel on the Internet

Keystroke Logger

records everything you type, like credit card numbers

When you delete a file in Windows, it is actually stored in the _____ where you have a second chance to decide if you still need the file.

recycle bin

If you inadvertently delete a needed file from your computer's Documents folder, in Windows, you can recover it by ________

restoring it from the recycle bin

system restore

returns your computer settings to a previous point in time

tries to convince you that your computer is infected.

scareware

You may do great harm to your computer by doing any of the following, EXCEPT ________.

scheduling regular virus scans

A virus hidden in a website is known as a(n) ________,

script

____ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

scripts

packet

small piece of data that travels through the Internet

Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

sniffers

A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ______ virus.

stealth

A(n) ____ backup creates an exact copy of an entire internal hard drive on an external hard drive.

system image

network address translation

technique of assigning hidden internal IP addresses to protect a network against hackers

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n)

trojan horse

A(n) _____ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.

trojan horse

Backdoor programs and zombies are used to launch denial-of-service attacks.

true

Computer threats can come from your behavior as well as from outsiders or hackers.

true

Malware can be prevented by using antimalware software.

true

Modern virus protection software packages are easy to use.

true

You can help keep your system safe by keeping your apps and operating system updated.

true

You can set Windows to update automatically at certain intervals such as daily or weekly.

true

Windows Defender protects your computer from all of the following EXCEPT ________.

unexpected software updates

security patch

update code provided by software vendor

Which of the following are considered slightly different from viruses because they can run without user interaction?

worms

Which of the following statements is NOT true about identity theft?

Thieves can easily defeat 2-factor authentication.

Which is NOT a feature of security software?

Keystroke logging

aggressive advertising

Correct answer displaying enticing information to tempt you to buy

If you encounter a problem, the Windows ________ feature can take your system back in time to a point where it was working properly.

System restore


संबंधित स्टडी सेट्स

Accounting Exam #2 multiple choice

View Set

CS Y1 - 4 - Algorithmics Links (Point to where you are going)

View Set

07.05 Testing Tips - Misconceptions and Timed Testing 100% CORRECT💯✅

View Set

National Income and Product Accounting Quiz

View Set

Forearm and Hand: Ligaments and movements

View Set

Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Alcohol Use questions in book, powerpoint, online book

View Set