ITEC 1001 Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In the settings area of each browser you should consider

-periodically deleting cookies -blocking/customizing cookie settings -decide from which sites you allow cookies

Rootkits are typically used to allow hackers to do which three of the following?

Create backdoors Install rogue files Encrypt files

Which three of the following statements are true regarding passwords and passcodes?

Passwords can be used to secure computers, networks, software, personal accounts, and digital devices Keys are often generated by encryption software or by the vendor who produced the software The terms passcode and key are synonymous for password

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

Safari accepts cookies and website data from which of the following?

only the websites you visit

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffer

According to US-CERT if you receive a phishing message you should contact them using which of the following methods.

-In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. -In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. -If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT

Common symptoms of a computer virus infection include

-OS doesnt launch -files deleted -strange error messages or pop up ads

Which of the following statements are true regarding RFID?

-RFID does not require line-of-sight scanning -Can be used to identify or track a variety of objects including poker chips, products, and even animals.

A program that appears legitimate, but executes an unwanted activity when activated is called a

Trojan horse virus

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

-ransomware -keystroke logging Trojan -phishing

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

-Most fee-based software comes with technical support -One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance

Cyberattacks include which three of the following?

-Pharming -Identity theft using a computer or network -Distributed denial-of-service (DDOS) attacks

There are a variety of cookie settings that can be adjusted in Google Chrome including

-blocking/allowing cookies by default.-deleting cookies-making exceptions for cookies from specific websites or domains.

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

-coppa -the Red Flags Rule

Rootkits allow a remote user to do which of the following.

-delete files -create backdoor programs -install rogue files

cyberattacks include

-DDoS attack -identifty theft

You can change your Firefox settings to allow you to

-approve -deny -delete cookies

According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?

1.Click the menu button, choose History, and then Clear Recent History. 2.Once you have cleared recent history you should set the time range to clear Everything. 3,Click on the arrow next to Details to expand list of history items. 4.Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.

According to Microsoft, the most efficient order of steps to customize cookie settings is?

1.Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2.Tap or click the Tools button Tools , and then tap or click Internet options. 3.On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4.When you're done making changes, tap or click OK.

Put the following steps in the correct order for navigating to the Windows firewall area.

1.start 2.setting 3.update and security 4.window security

Which of the following are parts of a radio frequency identification (RFID) system?

Antenna Transceiver Transponder

Which of the following are considered e-commerce transactions?

C2C B2C B2B

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack

DDoS or DoS

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Packet filters Proxy servers

Which of the following are considered Intellectual property?

Trade secrets Patents Trademarks

Which three of the following settings can you restrict in the Mac OS?

Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

black hat

A group of compromised computers controlled by a hacker is called a _____.

botnet

The malicious use of computer code to modify the normal operations of a computer or network is called a ___

cyber attack

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cybercrime

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

put the steps of a virus infection in the correct ordera)the infection is spread to other devices or a networkb)an action such as running or opening the file triggers the virusc)the payload is activated and the virus starts its destructive actiond)arrives by an email attachment or visiting an infected site(type it in like a,d,b,c)

d,b,a,c

International laws on Internet privacy are very similar.

false

Radio frequency identification (RFID) is a relatively inexpensive technology that requires direct line of sight scanning.

false

The DMCA protects ___ from liability for copyright violations of its users.

isp

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

proxy

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomeware

A type of malware that is triggered each time you boot your computer is called a

rootkit

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

script kiddie

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Software that infects a computer and is created using computer code is called a computer _____.

virus

Common types of malware include______ .

virus,worm,trojan horses

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.


संबंधित स्टडी सेट्स

Chapter 14 DNA: The Genetic Material Assignment

View Set

Chapter 35 - Geriatric Emergencies

View Set

Nursing Care of Pts Having Surgery Med Surg Chapter 12/ #7

View Set

Chapter 6 Visit Charges And Compliant Billing

View Set

Chapter 9 (Advanced Inventory Management)

View Set

1.08 MLA Citation and Documentation

View Set

Unit 8 Post-War Boom & Cold War Conflict

View Set

Chapter 30: Environmental Emergencies (Questions)

View Set

Business Ethics Midterm Exam - Dr. Jiang

View Set