Part 2 - Cybersecurity
Select all that apply Which two of the following can help prevent a virus infection?
Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.
Select all that apply Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.
Authentication Encryption Access control
Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?
Availability
Virus symptoms
The operating system does not launch properly Critical files are deleted automatically
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
adware
A group of compromised computers controlled by a hacker is called a _____.
botnet
Small text files created by websites you visit that your web browser stores on your hard disk are called _____.
cookies
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a .
cyberattack
An attack using a computer is a ___.
cyberattack
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattack
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.
cybercrime
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.
cyberterrorist
Select all that apply There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
deleting cookies making exceptions for cookies from specific websites or domains blocking/allowing cookies by default.
Select all that apply You can change your Firefox settings to allow you to do which three of the following?
deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
distributed denial of service
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) _____.
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
email virus
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______.
hacker
A form of spyware/surveillance technology that records all typed actions is referred to as a ___.
keystroke logger
Select all that apply Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.
keystroke logging Trojan phishing ransomware
Select all that apply Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:
keystrokes account numbers passwords
Malware is short for software.
malicious
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.
malware
Typically computer viruses must be _____ to attack and do damage to a digital device.
opened and run
A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I
password
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _____
pharming
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _______.
pharming
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.
pharming
Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called ________.
phishing
Adware often accompanies downloaded _____.
programs
Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .
ransome
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called ________
ransomware
A type of malware that is triggered each time you boot your computer is called a ______
rootkit
How do computer viruses attack? Often, to actually launch an attack on a computer, a virus must be opened and ___.
run
Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page.
session
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate
A program that appears legitimate but executes an unwanted activity when activated is commonly called a __.
Trojan
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
Trojan
Select all that apply Which of the following three are common types of malware?
Trojans Viruses Worms
Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.
UBE
Select all that apply Select two true statements about packet sniffers.
Unauthorized sniffers are used to steal information. Legitimate sniffers are used for routine examination and problem detection.
Select all that apply Which of the following are widely used tactics that can keep you safe on the Web?
Use your browser's private browsing mode. Consider using a VPN Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS.
Select all that apply Computer viruses can infect a digital device in which three of the following ways?
Visiting a contaminated website Downloading an infected file from the Internet Opening an infected e-mail attachment
Select all that apply Which three of the following are ways to prevent computer virus infections?
Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently. Downloaded content from the web should only be from trusted sites.
This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?
Button 4
Select all that apply Select three true statements regarding persistent cookies.
Collect information about user preferences. Collect information about the Internet protocol (IP) Address. Collect password and username information.
Select all that apply Rootkits are typically used to allow hackers to do which two of the following?
Create backdoors Install rogue files
Select all that apply Which three of the following are considered cybercrimes?
Cyberbullying Intentional data corruption Data theft
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.
DDoS or DoS
Select all that apply Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.
Data are regularly backed up. Data correction codes are used to ensure the data retrieved are the same as when it was stored.
Select all that apply Select three functions of session cookies.
Determine the web browser being used. Analyze and measure traffic on a web page. Determine the start and end of a session.
Select all that apply Which two of the following statements are true regarding firewalls?
Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.
Anti-malware apps
Help protect against malware: These apps help protect against a variety of malicious programs.
Anti-virus programs
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
Firewalls
Help protect against worms and hackers. Firewall programs help protect against worms and hackers
Select all that apply Malware may be designed to do which three of the following?
Incapacitate a computer or network Steal information Destroy data
Select all that apply Which of the following three statements are true about Trojan malware?
Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves.
Select all that apply Persistent cookies store information about which two of the following?
Password and username information User preferences
Select all that apply Cyberattacks include which three of the following?
Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network
Select all that apply Which of the following two statements best describe phishing?
Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
Private
Select all that apply Which three of the following are well-known e-mail attacks?
Ransomware Keystroke-logging Trojan Phishing
first-party cookie
Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Select all that apply The use of cookies allows you to do which of the following?
Surfacing of local (geotargeted) content Store site preferences Remain signed into websites
Select all that apply Which of the following may be indications that your system has been hacked? (Select all that apply.)
The computer turns on or off by itself Fake e-mails or social media messages in your account Unwanted browser toolbars Frequent random pop-ups
Ransomeware
When activated, encrypts files on user hard drive and then sells a decryption program
Keystroke-logging Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator.
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ____. An army of these are used to launch denial of service (DoS) attacks.
Zombie
Select all that apply Select 3 ways in which computer virus commonly infect vulnerable digital devices.
inserting and opening an infected thumb drive opening an infected e-mail attachment sharing an infected file
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.
keystroke
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Specialized hardware or software that capture packets transmitted over a network are called packet ______
sniffer
DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was
spam
Select all that apply What are the two common symptoms of a computer virus?
Documents will not save Programs launch on their own
Ways to catch a computer virus
Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop
Select all that apply Which three of the following statements are true about spyware?
Installed via free downloads or by visiting certain illegitimate websites. Collects information about your Internet surfing habits and behaviors. Includes the collection of keystrokes, passwords, and confidential information
Select all that apply Which three of the following statements are true regarding passwords and passcodes?
Keys are often generated by encryption software or by the vendor who produced the software Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password
Select all that apply In Firefox, cookies can store a wide range if information including which of the following?
Name Email address Home address
Select all that apply Which of the following three statements are true regarding keystroke loggers?
Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications.
Select all that apply Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.
Storing data on multiple hard drives. Ensuring that the data server has an appropriate amount of bandwidth. Having standby equipment available to take over in a situation where the main system fails.
Put the following steps of a virus infection in the correct order.
1. The virus arrives via email attachment file download, or by visiting an infected site 2. An action such as running or oopening the file triggers the virus. 3. The payload is activated and the virus starts its destructive actions.
Select all that apply According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.
A company has a long-standing policy to disable the usernames and passwords for executives after their employment has ended, but not for lower level employees who have left the company. During an acquisition, logistics data are securely transferred to the acquiring company's servers.
Select all that apply When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.
Access control Authentication
According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.
Access to important data is limited so that only certain employees are able to modify that data. During an acquisition, logistics data are securely transferred to the acquiring company's servers.
Select all that apply An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Router Computer Server
After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?
Settings
When you open the options tab in Firefox, after you select the menu button, where would you click to adjust cookie settings?
Settings
third-party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.
hacker
Software that illicitly collects information about your Internet surfing habits and behaviors is called __.
spyware
Software that illicitly collects information about your Internet surfing habits and behaviors is called ______
spyware
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber _____.
terrorist
Where do you click to adjust cookie settings in Edge? To adjust cookies in Edge, where would you click first?
the 3-dot "Settings and more" icon
A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.
trojan
Software that infects computers and is created using computer code is called a computer _____.
virus
A destructive program that replicates itself throughout a single computer or across a network is called a __.
worm
An army of these are used to launch denial of service (DoS) attacks or an apocalypse!
zombie
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.
zombie