Chapter 5 : Security (ALA)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which two of the following can help prevent a virus infection? - Use an old and trusted router. - Adjust your web browser's security settings to allow browsing only on trusted sites. - Never bypass your browser's built-in security features. - Leave your universal serial bus (USB) storage devices plugged in when you boot your computer.

- Adjust your web browser's security settings to allow browsing only on trusted sites. - Never bypass your browser's built-in security features.

Computers infected with a virus exhibit many symptoms including which three of the following? - Your speakers suddenly play "Never Gonna Give You Up" - Files get deleted or encrypted - Strange error messages or pop-up ads - OS does not launch properly

- Files get deleted or encrypted - Strange error messages or pop-up ads - OS does not launch properly

Software that illicitly collects information about your Internet surfing habits and behaviors is called ___.

Choice spyware

An attack using a computer is a ___.

cyberattack

Harming or harassing via information technology and networks in a repeated and deliberate manner is called ___.

cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) ___.

email

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ___.

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a ___.

hacker

A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.

macro

A virus written in a macro language and placed within a document or spreadsheet is called a ___ .

macro virus

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

A type of malware that is triggered each time you boot your computer is called a ___.

rootkit

Specialized hardware or software that capture packets transmitted over a network are called packet ___.

sniffers

Cyberattacks include which three of the following? - Pharming - Hardware theft - Identity theft using a computer or network - Distributed denial-of-service (DDOS) attacks

- Pharming - Distributed denial-of-service (DDOS) attacks - Identity theft using a computer or network

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called ___.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called___.

cybercrime

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

- Spectre - Meltdown

A ___ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

A group of compromised computers controlled by a hacker is called a ___.

botnet

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber ___.

terrorist

A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.

trojan

A destructive program that replicates itself throughout a single computer or across a network is called a ___.

worm

A form of spyware that records all actions typed on a keyboard is called a ___ logger.

keystroke

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) ___.

Trojan

Categorize the following as either virus symptoms or ways to catch a computer virus (two in each category). - Finding a thumb drive and then using it in your laptop. - The operating system does not launch properly. - Critical files are deleted automatically. - Downloading files from questionable Internet sites.

Virus symptoms: - The operating system does not launch properly. - Critical files are deleted automatically. Ways to catch a computer virus: - Finding a thumb drive and then using it in your laptop. - Downloading files from questionable Internet sites.

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ___.

zombie

Put the following steps of a virus infection in the correct order. - The payload is activated and the virus starts its destructive actions. - The virus arrives via e-mail attachment, file download, or by visiting an infected site. - An action such as running or opening the file triggers the virus.

- The virus arrives via e-mail attachment, file download, or by visiting an infected site. - An action such as running or opening the file triggers the virus. - The payload is activated and the virus starts its destructive actions.

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called ___.

white hat hackers

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called ___.

adware

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ___ of service attack.

denial

Typically computer viruses must be ___ to attack and do damage to a digital device.

opened and run

Software programs that hide in the operating system and allow for the installation of hidden files are called ___.

rootkit

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___.

hacktivist

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) ___.

script kiddie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Select two true statements about packet sniffers. - Unauthorized sniffers are used to steal information. - Packet sniffers use viruses to capture data packets. - Packet sniffers are relatively easy to detect. - Legitimate sniffers are used for routine examination and problem detection.

- Unauthorized sniffers are used to steal information. - Legitimate sniffers are used for routine examination and problem detection.

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a ___ logger.

keystroke

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ___ kiddies.

script

Match the following terms to their correct definition. Terms: - Phishing - Ransomware - Keystroke-logging Trojan Definition: - When activated, saves all keystrokes for subsequent transmission to virus creator. - When activated, encrypts files on user hard drive and then sells a decryption program. - Tricks users into revealing usernames and passwords by appearing legitimate.

- Phishing : Tricks users into revealing usernames and passwords by appearing legitimate. - Ransomware : When activated, encrypts files on user hard drive and then sells a decryption program. - Keystroke-logging Trojan : When activated, saves all keystrokes for subsequent transmission to virus creator.

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email

Rootkits are typically used to allow hackers to do which three of the following? - Install drivers - Install rogue files - Create backdoors - Encrypt files

- Install rogue files - Create backdoors - Encrypt files

Which three of the following are ways to prevent computer virus infections? - Install the latest antivirus software and update frequently. - Downloaded content from the web should only be from trusted sites. - Web surfing should be limited to trusted sites. - Frequently close programs and restart your computer.

- Install the latest antivirus software and update frequently. - Downloaded content from the web should only be from trusted sites. - Web surfing should be limited to trusted sites.

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email. - Phishing - Thumb sucking - Keystroke logging trojan - Ransomware

- Phishing - Keystroke logging trojan - Ransomware

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Hacking computer systems for politically or socially motivated purposes is called ___.

hacktivism


Set pelajaran terkait

Research Design and Statistical Analysis CHAPTER ELEVEN TRUE/FALSE - FINAL EXAM

View Set

Chapter 7 - Mood Disorders and Suicide

View Set

Inhaled Anticholinergic Bronchodilator Agents

View Set

Chapter 21 The Revolution in Energy and Industry AP Euro

View Set

Physical Science Exam chapter 25

View Set

ASB 222 Ancient Cities and Lost Tribes: Module 2

View Set

Final Exam Org Strategy and Policy Dr. Perez Batres MSU

View Set