AL: Computer Security
Anti-malware apps
Help protect against malware: These apps help protect against a variety of malicious programs.
Anti-virus programs
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
Firewalls
Help protect against worms and hackers: Firewall programs help protect against worms and hackers
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Which three of the following are well-known e-mail attacks?
Phishing Ransomware Keystroke-logging Trojan
Which two of the following statements are true regarding firewalls?
The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.
On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?
advanced
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
adware
There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
blocking/allowing cookies by default. deleting cookies. making exceptions for cookies from specific websites or domains.
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a
cyberattack
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ____ of service attack.
denial
Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a
hacker
Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.
hacker
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
pharming
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.
pharming
Fill in the blank question. The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called
phishing
Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called
phishing
Adware often accompanies downloaded _____.
programs
Often, to actually launch an attack on a computer, a virus must be opened and ___.
run
In Facebook, where would you click to download a copy of your Facebook data?
settings
DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was
spam
Unsolicited e-mail is __.
spam
A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.
trojan
Software that infects computers and is created using computer code is called a computer _____.
virus
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
email virus
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
private
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.
trojan