Chapter 5: Security
Select what's true about worms:
1) Automatically reproduce 2)Replication exhausts network bandwidth or available storage 3) Designed to attack only wired networks. 4) Often sent using email attachments
There are a variety of cookie settings that can be adjusted in Google Chrome including:
1) Blocking/Allowing cookies by default. 2) Deleting cookies. 3) Making exceptions for cookies from specific websites or domains. 4) Creating third-party cookies.
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
Cybercrime
A form of spyware that records all actions typed on a keyboard is called a ________ logger?
Keystroke
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
Persistent
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
Quarantine
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
Sniffers
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a?
Trojan Horse
According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?
1) Click the menu button, choose History, and then Clear Recent History. 2) Once you have cleared recent history you should set the time range to clear Everything. 3) Click on the arrow next to Details to expand list of history items. 4) Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.
If you believe you have fallen victim to a phishing scam you should:
1) Contact the institution the message was allegedly sent from. 2) Contact US -CERT. 3) Contact your ISP. 4) Contact the person or organization who sent the message.
Identify common symptoms of a computer virus:
1) Documents won't save. 2) Computer runs extremely slow. 3) Programs launch on their own. 4) Your computer won't power on.
Which of the following are ways to prevent computer virus infections?
1) Install the latest antivirus software and update frequently. 2) Leave thumb drives and DVD's in your computer when you restart it. 3) Downloaded content from the web should only be from trusted websites. 4) Limit your web surfing to trusted sites.
Select what's true about packet sniffers:
1) Legitimate sniffers are used for routine examination and problem detection. 2) Unauthorized sniffers are used to steal information. 3) Packet sniffers are relatively easy to detect. 4) Packet sniffers use viruses to capture data packets.
Common symptoms of a computer virus infection include:
1) OS doesn't launch properly. 2) Files get deleted or encrypted. 3) Strange error messages or pop-up adds. 4) Mouse and keyboards do not work properly.
Select what's true about Trojan malware:
1) Often found attached to free downloads or apps. 2) Often used to find passwords, destroy data, or to bypass firewalls. 3) Similar to adware. 4) Trojan malware is the same as a macro virus.
Which of the following are online nuisances?
1) Spam 2) Spyware 3) Spoofing 4) Chat Bots
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
Cyberbulling
What is the name of a virus written in a macro language and placed within a document or spreadsheet?
Macro Virus
According to US-CERT, if you receive a phishing message you should contact them using which of the following methods?
None
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called?
White Hat Hackers