Chapter 4 - Internet Security (Q&A)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How does an attacker use a malvertising attack? a) Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers. b) Attackers directly infect the website that is being compromised by identifying a vulnerability in the web server. c) Resource objects are sent as email attachments with a source that pretends to be a well-known advertising agency. d) Java applets are attached to spam messages that pretend to be advertisements.

a) Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.

What is the first step in defending against Internet-based attacks? a) Ensure that the computer itself is properly secured. b) Do not open email attachments. c) Use a web browser that supports automatic downloads. d) Add security extensions to the web browser.

a) Ensure that the computer itself is properly secured.

Each of the following is true about the Internet except: a) It is a local network of computers and networks. b) Industry, governments, schools, and individuals all loosely cooperate in the Internet's self-governance. c) It is not controlled by a single organization or government entity. d) It is composed of networks to which devices are attached.

a) It is a local network of computers and networks.

Why should you not click on an embedded hyperlink? a) They can take you to a different website other than what is being advertised. b) They can take up too much disk space on your computer. c) They seldom work properly. d) They are slow.

a) They can take you to a different website other than what is being advertised.

Why would you want to block external content from downloading into your email client? a) To prevent spammers from knowing that your email address is valid b) To take advantage of the remote reading pane c) To prevent your computer's graphics processor utility buffer from filling too quickly d) To slow down your email client so you can read the message

a) To prevent spammers from knowing that your email address is valid

What technique do attackers use in order to circumvent text-based spam filters? a) image spam b) Flash spam c) attachment spam d) object spam

a) image spam

Which of the following is not a secure Internet practice? a) Do not click on embedded hyperlinks in an email. b) Run JavaScript code to prevent attacks. c) Restrict cookies in web browsers through browser settings. d) Double-check spelling on a typed web address before submitting.

b) Run JavaScript code to prevent attacks.

Which of the following is not a web browser addition to enhance security? a) URL expander b) website reputation c) plug-in validation d) local intranet flash signal

d) local intranet flash signal

A cookie that was not created by the website that attempts to access it is called a(n)_____. a) second-party cookie b) resource cookie c) first-party cookie d) third-party cookie

d) third-party cookie

Which of the following is the more recent and advanced electronic email system? a) Transmission Control Protocol (TCP) b) Post Office Protocol (POP) c) IMAP (Internet Mail Access Protocol) d) Simple Mail Transfer Protocol (SMTP)

c) IMAP (Internet Mail Access Protocol)

Which is the most popular scripting code used with webpages? a) Hypertext Markup Language (HTML) b) Java c) JavaScript d) Hypertext Transport Protocol (HTTP)

c) JavaScript

Which of the follow web browser additions provides links to external programs? a) Java applet b) extension c) plug-in d) add-on

c) plug-in

A reading pane allows the user to read an email message_________. a) only one time b) from a remote location c) without actually opening it d) after the attachment has been saved to the hard drive

c) without actually opening it

Bob's computer was infected from a drive-by download attack. What did Bob do to get infected? a) He opened an email attachment. b) He unknowingly sent a virus to a website. c) He clicked Download. d) He viewed a website.

d) He viewed a website.

Each of the following is an addition that could be added to a web browser to support dynamic browsing except ________. a) add-ons b) plug-ins c) extension d) Jscript

d) Jscript

A(n) _____ is a list of email addresses from senders from whom you do not want to receive messages. a) blacklist b) greenlist c) whitelist d) redlist

a) blacklist

What is the format used to write webpages? a) Transmission Control Protocol/Internet Protocol (TCP/IP) b) Hypertext Markup Language (HTML) c) Microsoft Adobe Printer (MAP) d) Hypertext Transport Protocol (HTTP)

b) Hypertext Markup Language (HTML)

Which of the following is true about a cookie? a) It places a small file on the web server computer sent from the browser. b) It can pose a security and privacy risk. c) It acts like a worm. d) It can contain a virus.

b) It can pose a security and privacy risk.

Which type of cookie is the most complex? a) extender cookie (CE) b) locally shared object (LSO) c) control cookie (CC) d) plug-in cookie

b) locally shared object (LSO)

The most secure option when configuring a web browser for security is __________. a) Accept first-party cookies. b) Accept first-party cookies but deny third-party cookies. c) Deny first-party and third-party cookies. d) Reject locally shared objects but accept second-party cookies.

c) Deny first-party and third-party cookies.


Set pelajaran terkait

Chapter 12 The benefit determination process

View Set

Dichotomous key major types of fruits

View Set

Study guide 4 2nd part of psychology final

View Set

Psychology B: What is Psychotherapy? Quiz

View Set

ECON 101: Microeconomics Exam #3

View Set