AL: Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Anti-malware apps

Help protect against malware: These apps help protect against a variety of malicious programs.

Anti-virus programs

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Which three of the following are well-known e-mail attacks?

Phishing Ransomware Keystroke-logging Trojan

Which two of the following statements are true regarding firewalls?

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

advanced

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

blocking/allowing cookies by default. deleting cookies. making exceptions for cookies from specific websites or domains.

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ____ of service attack.

denial

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Fill in the blank question. The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called

phishing

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

Adware often accompanies downloaded _____.

programs

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

In Facebook, where would you click to download a copy of your Facebook data?

settings

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

Unsolicited e-mail is __.

spam

A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.

trojan

Software that infects computers and is created using computer code is called a computer _____.

virus

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

email virus

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

trojan


Set pelajaran terkait

The Boston Tea Party, Intolerable Acts & First Continental Congress

View Set

Alkenes and organic chemistry revision

View Set

Chapter 2- Scanning Planes and Scanning Methods

View Set

Life and Health Insurance ExamFX

View Set

Intro to Business (Basic Vocab, Chapter 7)

View Set