Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Put the following steps in the correct order for adjusting cookie settings.

1. Choose Safari 2. Click Preferences 3. Click Privacy 4. Change cookie settings

Put the following steps in the correct order for adjusting cookies and site data permission settings in Google Chrome.

1. Click the Chrome menu on the browser toolbar then select Settings. 2. Click Show advanced settings. In the "Privacy" section, click the Content settings button. 3. In the "Cookies" section change the desired cookie settings.

Put the following steps in the correct order for navigating to the Windows Defender (firewall) area.

1. Click the Start button 2. In the search bar, type Windows Security 3. Select Virus & Threat protection 4. Click Manage settings

Put the following steps in the correct order to set parental controls in Mac OS X.

1. Select system preferences, then click Parental controls 2. Click the lock icon to unlock it, then enter an administrator name and password 3. Select a user, then click Enabled Parental Control 4. If the user is not in the list, click Add, then fill in the name, account, and password information to create a new user

Put the following steps in the correct order for setting up an Internet filter in Microsoft Windows.

1. Sign into your Microsoft Account 2. Select the account you want to implement filtering and select Content restrictions 3. Select Web browsing 4. Select Block inappropriate websites select On

Put the following steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site 2. An action such as running or opening the file triggers the virus 3. The payload is activated and the virus starts its destructive actions.

What is the correct definition of a cybersecurity exploit?

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.

Suppose an organization's system is vulnerable to losing information because its automated backup of data is insufficient or substandard. This type of cybersecurity vulnerability is —.

A weakness in application software

In 2024, UnitedHealth reportedly paid $22 million in Bitcoin to a Russian ransomware group called —.

ALPHV-BlackCat

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

Access to important data is limited so that only certain employees are able to modify that data. During an acquisition, logistics data are securely transferred to the acquiring company's servers.

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

Adware

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

Apple menu

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality?

Authentication Access control

Remote employees of a corporation are required to login to their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality?

Authentication Encryption Access control

A type of Trojan that remote attackers use to gain unauthorized access to a computer or network is called a — Trojan.

Backdoor

Match the type of Trojan with its attack.

Backdoor Trojan: a type of malware remote attackers use to gain unauthorized access to a computer or network Exploit Trojan: A program designed to take advantage of vulnerabilities with a specific computer application or systems Ransom Trojan: Malware designed to take data stored on a device hostage by blocking or encrypting the data.

A — hat hacker breaks into computer systems with the intent of causing damage or stealing data.

Black

A group of compromised computers controlled by a hacker is called a _____.

Botnet

Where on the Mozilla Firefox screen (as shown in the image) would you click to delete cookies?

Button 4

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Which three of the following statements are true about spyware?

Collects information about your Internet surfing habits and behaviors. Installed via free downloads or by visiting certain illegitimate websites. Includes the collection of keystrokes, passwords, and confidential information

Which of the following three statements are true regarding macro viruses?

Commands in the macro language set off the destructive events. When file is opened the macro virus executes. Initiated by downloading and opening an infected attachment.

Which of the following are widely used tactics that can keep you safe on the Web?

Consider using a VPN Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS.

Select three privacy risks associated with cookies.

Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.

— are cybersecurity breaches that make a computer or online service unavailable to its users.

DDOS attacks

Which of the following is an example of a tool that could be used to ensure data integrity?

Data correction codes are used to ensure the data retrieved are the same as when it was stored. Data are regularly backed up.

Which three of the following are considered cybercrimes?

Data theft Intentional data corruption Cyberbullying

Select three functions of session cookies.

Determine the start and end of a session. Determine the web browser being used. Analyze and measure traffic on a web page.

The acronym DDOS stands for —.

Distributed Denial of Service

Which of the following are considered cybersecurity breaches?

Distributed Denial of Service (DDOS) Impersonation Spyware Viruses

Which three of the following are ways to prevent computer virus infections?

Downloaded content from the web should only be from trusted sites. Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently.

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) —.

E-mail virus

Most viruses are hidden as a link from a corrupted website, an attachment to download software, or as an attachment to a(n) —.

Email

In Firefox, cookies can store a wide range of information including which of the following?

Email address Name Home address

Designed to take advantage of software vulnerabilities, cybersecurity — include specific code (or sequences of code) that allow intruders to gain unwarranted privileges in a network.

Exploits

Malicious core that runs within a device's memory instead of the hard drive is referred to as — malware.

Fileless

What aspects of security incidents are typically managed by a chief information security officer (CISO)?

Handling security incidents and events Developing security policies

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Rootkits are typically used to allow hackers to do which three of the following?

Install rogue files Create backdoors

Firewall software to block a user's access to specific Internet content is called a(n) — filter.

Internet

Which of the following three statements are true regarding keystroke loggers?

Keystroke loggers can record passwords and confidential information. Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Can be hardware devices and software applications.

Digital advertisements designed with malicious intent and deployed by bad actors are referred to as —.

Malvertising

From the following list, select 3 types of events and conditions that are considered cybersecurity threats.

Misuse or abuse of IT assets Unintentional, accidental, and incidental events Intentional events

Which of the following are common job responsibilities of an information security analyst (ISA)?

Monitoring organization networks to prevent security breaches Continually checking for vulnerabilities and taking measures to ensure network security

The technology that provides a type of firewall protection by hiding internal IP addresses is called —.

NAT (Network Address Translation)

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads

Which of the following three statements are true about Trojan malware?

Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves.

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Persistent cookies store information about which two of the following?

Password and username information User preferences

Which three of the following statements are true regarding passwords and passcodes?

Passwords can be used to secure computers, networks, software, personal accounts, and digital devices. The terms passcode and key are synonymous for password. Keys are often generated by encryption software or by the vendor who produced the software.

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as — cookies.

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

Pharming

Cyberattacks include which three of the following?

Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network

Which of the following two statements best describe phishing?

Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

Which of the following are symptoms of an online nuisance attack?

Pop-up start appearing after you visit unfamiliar sites. Receiving a lot of spam messages or bounced back e-mail messages. Frequent pop-ups while searching the web or working in programs

What are the two common symptoms of a computer virus?

Programs launch on their own Documents will not saves

Which three of the following are factors to consider to help protect the hardware of your digital device?

Protecting a digital device from humidity Protecting a digital device from magnetic fields Protecting a digital device from overheating

Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Proxy servers Packet filters

Which three of the following are well-known email attacks?

Ransomware Keystroke-logging trojan Phishing

Which three of the following can you restrict in the Mac OS?

Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites Which apps the user can access

A type of malware that is triggered each time you boot your computer is called a —.

Rootkit

An Internet/content filter is a firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Computer Server

To delete cookies in Safari, click —.

Settings

Software that illicitly collects information about your Internet surfing habits and behaviors is called —.

Spyware

Which 3 of the following are considered best practiced for ensuring that data are available?

Storing data on multiple hard drives. Having standby equipment available to take over in a situation where the main system fails Ensuring that the data server has an appropriate amount of bandwidth.

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

Which two of the following statements are true regarding firewalls?

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.

Which of the following may be indications that your system has been hacked?

The computer turns on and off by itself Frequent random pop-ups Unwanted browser toolbars Fake e-mails or social media messages in your account

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan

Which of the following organizations should you contact if you receive a phishing message?

US-CERT

Which 2 of the following statements are true about passwords?

Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. Check your accounts. Regularly check your accounts to ensure they have not been tampered with.

Computer viruses can infect a digital device in which of the three following ways?

Visiting a contaminated website Downloading an infected file from the Internet Opening an infected e-mail attachment

From the following list, select 2 types of cybersecurity vulnerabilities.

Weaknesses in system security procedures that could be intentionally compromised. Flaws in system security designs that could lead to an accidental compromise.

Match the terms about web cookies to their proper description.

Web cookie: small text files created by websites you visit that your web browser stores on your hard disk First-party cookie: small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session Third-party cookie: small text file of information by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called — hat hackers.

White

A computer that has been taken over by a hacker, typically using a rootkit, is referred to as a —.

Zombie

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

advanced

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

availability

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

black hat hacker

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

blocking/allowing cookies by default. making exceptions for cookies from specific websites or domains. deleting cookies.

If you believe you have fallen victim to a phishing scam you should:

contact US-CERT contact the institution the message was allegedly sent from

Small text files created by websites you visit that your web browser stores on your hard disk are called:

cookies

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.

The main characteristics that define cybersecurity threats are —.

events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss

Which component of a network designed to prevent unauthorized Internet intrusions?

firewall

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device

hardware

A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.

macro

Adware often accompanies downloaded _____.

programs

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

proxy

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

script kiddie

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

settings

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

A destructive program that replicates itself throughout a single computer or across a network is called a —.

worm


संबंधित स्टडी सेट्स

Chapter 1 - Accounting in Business!

View Set

3.5 insurable interest & 3.6 underwriting

View Set

ECO/372T: Principles Of Macroeconomics - Week 3

View Set

Marketing Ch 17-19, Marketing Chapter 17 & 18, Marketing Chapter 17, mkt ch 16, Marketing 4, MKT 301 - Ch. 16, Marketing Chapter 17, Marketing Chapters 16-18, mktg ch 10, MKTG Ch.10, CH.10-, Marketing Exam 3 Quiz, Marketing Test 2, MKTG 321 Ch 10 Fin...

View Set

Chapter Six: Other Sensory Systems Pt.1

View Set