MISY Module 5 Quiz
Cyberattack
-DOS attack -packet analyzer -rootkit
What are way that computer viruses can infect a digital device?
-opening an infected email attachment -downloading an infected file from the internet -visiting a contaminated website
What is considered Intellectual property?
-trade secrets -trademarks -patents
Persistent cookies store information about:
-user preferences -password and username information
What is protected by intellectual property laws against unauthorized use or distribution?
-video games -movies
Virus
-worm -trojan horse -macro -you cannot boot your computer -your computer is running slower than usual
On ___________ in the US the liability of paying for the fraud will fall on the party that is least chip-enabled.
October 1, 2015
A computer game (also referred to as ________ games) is where players interact with objects displayed on a screen for entertainment purposes using a computer.
PC
Juan attempts to gain unauthorized access to networks. Juan would be considered a ____________.
hacker
A form of spyware that records all actions typed on a keyboard is called a _________ logger.
key
What are the common symptoms of a computer virus?
-programs launch on their own -documents will not save
A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a __________.
cyberattack
A digital presence created online by an individual, organization using a digital device is called a ____________ identity.
digital
A destructive program that replicates itself throughout a single computer or across a network is called a __________.
worm
According to the FTC, a few US internet privacy laws/rules of importance are:
-COPPA: the Children's Online Privacy Protection Act gives parents control over what information websites can collect from their kids -the Red Flags Rule: the red flags rule requires many businesses and organizations to implement a written identity theft prevention program designed to detect the warning signs --- of identity theft in their day-to-day operations
What is true about WhatsApp Messenger?
-WhatsApp currently has over 900 million users worldwide -The logo for the WhatsAppMessenger is green with a white phone
Safari accepts cookies and website data from which of the following?
-only from websites you visit
Ways to catch a computer virus:
-opening suspicious or infected email messages -visiting questionable websites -downloading files from the internet
A digital identity is composed of a variety of digital attributes including:
-personal data such as your social security number and birth date -usernames and passwords -online search activities
Single event
-trojan horse -phishing -keystroke logger
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or ________.
Netiquette
Passports issued by the US and many other countries include ___________ chips.
RFID
If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud. True or False?
True
Ways to avoid a computer virus:
-adjust your web browser's security settings to allow browsing only on trusted sites -surf the web and download content safely -purchase a new router every other year to ensure you have the latest firewall protections
If you believe you have fallen victim to a phishing scam you should:
-contact the institution the message was allegedly sent from -contact US-CERT
On-going series of events
-cyberstalking -blackmail
Online Nuisance
-frequent pop-ups while searching the web or working in programs -receiving a lot of spam emails and bounced back email -pop-ups start appearing after visiting unfamiliar sites
Social media integrates a variety of multimedia including:
-images -websites -messaging -video
What is true about passwords?
-use a combination of letters, symbols, and numbers. the more characters you use, the more secure your password will be -check your accounts. regularly check your accounts to ensure they have not been tampered with
What technology allows for the electronic communications of business-oriented transactions and information between people and organizations?
EDI
In the US the federal ________ covers most consumer oriented electronic transactions.
EFT Act
Free openly licensed learning resources that are available online for instructors and students to use are called Open _______ Resources.
Education
International laws on internet privacy are very similar. True or False?
False
The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic _________ Transfer.
Funds
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called __________.
adware
Transferring a file from the Internet to your digital device is called __________.
downloading
A virus that is attached in a file in and sent via email message is called a(n) _________ virus.
The standard code of respectful behavior in society or among members of a particular profession or group is called ________.
etiquette
A popular free online payment service that allows you to send money and accept payments without revealing your personal financial information is __________.
paypal
A type of malware that is triggered each time you boot your computer is called a ____________.
rootkit
Stored in temporary memory, _________ cookies are used to analyze and measure traffic on a web page.
session
Spyware
software that collects information about your internet surfing habits and behaviors, but is used for more malicious activities such as identity theft