ITEC 1001- CH5 Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called _____.

Adware

Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. Contact the via the phone number listed on the US-CERT site.

A group of compromised computers controlled by a hacker is called a _____.

botnet

Human knowledge and ideas that the law protects against unauthorized use by others is considered ______ property.

intellectual

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

A ________ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

Cyberattacks include which three of the following?

Identity theft using a computer or network Distributed denial-of-service (DDOS) attacks Pharming

Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

internet

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I

password

A type of malware that is triggered each time you boot your computer is called a _________.

rootkit

Software programs that hide in the operating system and allow for the installation of hidden files are called _______.

rootkit

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

The Windows Security in Microsoft Windows is accessed by clicking Control Panel then Update and Security. Which three of the following firewall settings you can adjust by clicking Firewall & network protection?

Change notification settings Update your firewall settings Turn Windows firewall on or off

Which three of the following you should consider in the settings area of each browser?

Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _____ of service attack.

DoS

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

Which of the following are considered e-commerce transactions?

C2C B2B B2C

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

COPPA the Red Flags Rule

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Select three true statements regarding persistent cookies.

Collect password and username information. Collect information about user preferences. Collect information about the Internet protocol (IP) Address.

Select three privacy risks associated with cookies.

Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

Computers infected with a virus exhibit many symptoms including which three of the following?

Files get deleted or encrypted Strange error messages or pop-up ads OS does not launch properly

Which component of a network designed to prevent unauthorized Internet intrusions?

Firewall

The DMCA protects ___ from liability for copyright violations of its users.

ISPs

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

Internet

A virus written in a macro language and placed within a document or spreadsheet is called a _____ .

Macro Virus

Which two of the following can help prevent a virus infection?

Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance Most fee-based software comes with technical support

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

Which three of the following are factors to consider to help protect the hardware of your digital device?

Protecting a digital device from magnetic fields Protecting a digital device from humidity Protecting a digital device from overheating

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

Proxy

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Proxy servers Packet filters

Passports issued by the United States and many other countries include ____ chips.

RFID

Which of the following statements are true regarding RFID?

RFID does not require line-of-sight scanning Can be used to identify or track a variety of objects including poker chips, products, and even animals.

Which of the following are symptoms of an online nuisance attack?

Receiving a lot of spam messages or bounced back e-mail messages. Frequent pop-ups while searching the web or working in programs Pop-up start appearing after you visit unfamiliar sites.

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Router Computer

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Spectre Meltdown

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

Passports issued by the United States and many other countries include radio frequency identification (RFID) chips.

True

Persistent cookies store information about which two of the following?

User preferences Password and username information

Which three of the following are ways to prevent computer virus infections?

Web surfing should be limited to trusted sites. Downloaded content from the web should only be from trusted sites. Install the latest antivirus software and update frequently.

Which three of the following settings can you restrict in the Mac OS?

Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

Zombie

A Radio frequency identification (RFID) systems consists of three components: _______, transponder, and transceiver.

antenna

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

data

You can change your Firefox settings to allow you to do which three of the following?

delete stored cookies automatically when you start Firefox. approve cookies storage requests. deny cookie storage requests.

Derived from the Greek word ergon (work) and nomoi (natural laws), _____ is an important element of workplace safety.

ergonomics

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

false

The technology that uses electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals, and people is called Radio ______ identification.

frequency

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ____.

hacktivist

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

heuristic-based detection signature-based detection

International laws on ________ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

internet

You should consider where/how you place the following to create an ergonomically correct workstation, which includes:

keyboard monitor chair

A form of spyware that records all actions typed on a keyboard is called a ______ logger.

keystroke

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an _____ nuisance.

online

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _______.

pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

ransomware keystroke logging Trojan phishing

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called _____ kiddies.

script

The software code of a particular computer virus is called the virus

signature

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was ____.

spam

Most e-mail applications, such as Gmail and Outlook, provide robust ________ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

Software that illicitly collects information about your Internet surfing habits and behaviors is called ______.

spyware

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber________.

terrorist

The main governmental organization that oversees Internet privacy in the United States is the Federal _____ Commission

trade

A program that appears legitimate, but executes an unwanted activity when activated is called a _______ horse virus.

trojan

A transceiver can both send and receive information.

true

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud.

true

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called _______ hat hackers.

white

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a __-degree angle.

45

Which of the following statements are true about ergonomics?

A very important element of an effective workplace safety plan. Derived from the Greek words ergon (work) and nomoi (natural laws). The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Button 4

Select three functions of session cookies.

Determine the web browser being used. Analyze and measure traffic on a web page. Determine the start and end of a session.

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Which two of the following are ways to safely download antivirus software?

Download the software from a known antivirus software vendor Download the software from a trusted site like www.cnet.com

International laws on Internet privacy are very similar.

False

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Which three of the following statements are true regarding passwords and passcodes?

Keys are often generated by encryption software or by the vendor who produced the software The terms passcode and key are synonymous for password Passwords can be used to secure computers, networks, software, personal accounts, and digital devices

Select two true statements about packet sniffers.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.

Safari accepts cookies and website data from which of the following?

Only from websites you visit

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Which of the following are online nuisances?

Spam Spyware Spoofing

Copyright protection extends to things like images, music, and literary works. Copyright protection does not extend to which three of the following?

Systems Procedures Processes

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Heuristic and signature-based detection are two techniques used by ___ software.

antivirus

Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to- _____ transaction

consumer

If you believe you have fallen victim to a phishing scam you should:

contact US-CERT contact the institution the message was allegedly sent from

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _____.

copyright

Signed into law by President Clinton in 1998, The ________ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

digital

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) _______.

email

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at ______, a company better known for its search engine and its Pixel series smartphones.

google

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______.

hacker

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.

macro

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.

Formerly owned by eBay, a popular free online payment service that allows you to send money, and accept payments without revealing your personal financial information is _____.

paypal

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called ____.

phishing

Adware often accompanies downloaded _____.

programs

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a _____ filter.

spam

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm


संबंधित स्टडी सेट्स

Chapter 15 "Medical Expense Insurance, Purpose, Base Plans" Insurance Questions

View Set

ONLINE SYSTEMS : FUNCTIONS AND PLATFORMS - E- TECH

View Set

Jason Dion Network+ N10 008 Missed Practice Test Questions

View Set

1.3 Economic Models Macroeconomics Hubbard 6th Edition

View Set

Electromagnetic Spectrum & Telescopes and Light

View Set

Int. economic quiz questions for test 2

View Set