ITEC 1001 Chapter 5 Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Rootkits are typically used to allow hackers to do which three of the following?

1.Create backdoors 2.Install rogue files 3.Encrypt files

Computers infected with a virus exhibit many symptoms including which three of the following?

1.Files get deleted or encrypted 2.Strange error messages or pop-up ads 3.OS does not launch properly

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

1.Most fee-based software comes with technical support 2.One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance

Persistent cookies store information about which two of the following?

1.User preferences 2.Password and username information

If you believe you have fallen victim to a phishing scam you should:

1.contact US-CERT 2.contact the institution the message was allegedly sent from

A form of spyware that records all actions typed on a keyboard is called a _______logger.

Keystroke

Which of the following statements are true about ergonomics?

1.A very important element of an effective workplace safety plan 2.Derived from the Greek words ergon (work) and nomoi (natural laws). 3.The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.

Which two of the following statements are true regarding firewalls?

1.The Mac OS includes firewall protection. 2.Having more than one firewall app on your computer may cause conflicts and other problems.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Select three true statements regarding persistent cookies.

1.Collect information about the Internet protocol (IP) Address. 2.Collect information about user preferences. 3.Collect password and username information.

Which three of the following may be indications that your system has been hacked?

1.Redirected Internet searches 2.Fake e-mails or social media messages in your account 3.Unwanted browser toolbars

Which three of the following statements are true regarding passwords and passcodes?

1.The terms passcode and key are synonymous for password 2.Passwords can be used to secure computers, networks, software, personal accounts, and digital devices 3.Keys are often generated by encryption software or by the vendor who produced the software

Put the following steps in the correct order for setting restrictions in Mac OS X.

1. Select System Preferences,then click Parent Control 2.Click the lock icon to unlock it, then enter an administrator name. 3.Select a user, then click one of the tabs along the top

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

Adware

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

Cybercrime

Which component of a network designed to prevent unauthorized Internet intrusions?

Firewall

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at _______, a company better known for its search engine and its Pixel series smartphones.

Google

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______

Hacker

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:

Internet

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an______ nuisance.

Online

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

Pharming

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

Proxy

A type of malware that is triggered each time you boot your computer is called a

Rootkit

Software programs that hide in the operating system and allow for the installation of hidden files are called

Rootkits

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called

Script Kiddies

Stored in temporary memory, _______ cookies are used to analyze and measure traffic on a web page.

Session

The software code of a particular computer virus is called the virus

Signature

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

Spyware

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber_______

Terrorist

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

antivirus software

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers


संबंधित स्टडी सेट्स

Chapter 3| The Structure of Bones & Joints

View Set