cgs2100 chapter 1 quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

whats true about worms

-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email notifs

which of the following are cookie settings you can adjust in internet explorer

-block -allow -delete

select what's true about session cookies

-determine the start and end of a session -analyze and measure traffic on a web page -determine the web browser being used

which of the following are considered cybercrimes?

-internet scams -cyberespionage -information theft

whats true about trojan malware

-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewall

which of the following are common email viruses

-ransomware -keystroke logging

common types of malware include

-viruses -worms -trojan horses

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDos

a DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym for DDoS stands for

Distributed Denial of Service

spam messages are sometimes referred to as

UBE

which of the following would be considered a cybercrime?

data manipulation

firewall software used to block a user's access to specific internet content is called ___ filter

internet filter

cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent cookies

specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

you must individually adjust cookie settings in every browser you use

true

a destructive program that replicates itself throughout a single computer or across a network is called a

worm

identify whats true about script kiddies

-amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written


Set pelajaran terkait

Nursing Care of the Child with a Cognitive or Mental Health Disorder

View Set

Computer Science Fundamental Unix

View Set

HRTM 344 - Professional Organization and Supervision

View Set

Paragraph Patterns- Sem 1 Topic Sentences

View Set