Chapter 7 Adaptive Learning Assignment: Computer Security
Which three of the following statements are true about spyware?
1. Installed via free downloads or by visiting certain illegitimate websites. 2.Includes the collection of keystrokes, passwords, and confidential information 3.Collects information about your Internet surfing habits and behaviors.
Which three of the following are factors to consider to help protect the hardware of your digital device?
1. Protecting a digital device from humidity 2.Protecting a digital device from overheating 3.Protecting a digital device from magnetic fields
Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.
1. ransomware 2.keystroke logging Trojan 3.phishing
According to the CIA triad, in which of the following examples is an organization ensuring data integrity
1.Access to important data is limited so that only certain employees are able to modify that data. 2.During an acquisition, logistics data are securely transferred to the acquiring company's servers.
Which of the following three are common types of malware?
1.Worms 2.Trojans 3.Viruses
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Ransomware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code
Black Hat Hacker
What type of hacker breaks into computer systems with the intent of causing damage or stealing data?
Firewall
Which component of a network designed to prevent unauthorized Internet intrusions?
a. Firewalls b. Anti-virus Programs c. Anti-malware Programs
a. Help protect against worms and hackers: Firewall programs help protect against worms and hackers. b. Help protect against viruses: These programs help to protect your system from a variety of virus threats. c. Help protect against malware: These apps help protect against a variety of malicious programs.
A group of compromised computers controlled by a hacker is called a _____.
botnet
A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.
private
Adware often accompanies downloaded _____.
programs
Most e-mail applications, such as Gmail and Outlook, provide robust_____ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.
spam
1.Corporate and government entities can track your web behavior. 2.Websites using cookies can collect your information and sell it to third parties. 3.Websites can track your surfing behavior and create a profile.
three privacy risks associated with cookies.
A program that appears legitimate, but executes an unwanted activity when activated is called a____ horse virus
trojan
A destructive program that replicates itself throughout a single computer or across a network is called a
worm
When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality?
1. Access Control 2. Authentication
Which 2 of the following statements are true about passwords?
1. Check your accounts. Regularly check your accounts to ensure they have not been tampered with. 2. Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be.
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
1.Router 2.Server 3.Computer
Which of the following are online nuisances
1.Spoofing 2.Spam 3.Spyware
Which three of the following are ways to prevent computer virus infections?
1.Web surfing should be limited to trusted sites. 1.Downloaded content from the web should only be from trusted sites. 3.Install the latest antivirus software and update frequently.
Select 3 ways in which computer virus commonly infect vulnerable digital devices.
1.opening an infected e-mail attachment 2.sharing an infected file 3.inserting and opening an infected thumb drive
cybercrime
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
cyberattack
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network
hacker
A person who gains unauthorized access to networks in order to steal and corrupt information and data
Rootkit
A type of malware that is triggered each time you boot your computer
Password
A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____
Macro Virus
A virus written in a specific language and placed within a document or spreadsheet is called a
Spam Filter
Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a
A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .
E-mail virus
If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.
False
websites using cookies can collect your information and sell it to third parties
One of the risks with cookies is ___.
cookies
Small text files created by websites you visit that your web browser stores on your hard disk are called
Sniffers
Specialized hardware or software that capture packets transmitted over a network are called pack
NAT (Network Address Translation)
The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.
Availability
Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to an
Typically computer viruses must be _____ to attack and do damage to a digital device.
opened and run
A typical ___ manager (such as Dashlane or LastPass) is installed as a browser plug in and provides for extremely secure logins.
password
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
pharming
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a
zombie
Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality?
1.Authentication 2.Access Control 3.Encryption
Malware may be designed to do which three of the following?
1.Destroy data 2.Steal information 3.Incapacitate a computer or network
Cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a
Which of the following is an example of a tool that could be used to ensure data integrity
1.Data correction codes are used to ensure the data retrieved are the same as when it was stored. 2.Data are regularly backed up.
Which three of the following you should consider in the settings area of each browser?
1.Deleting cookies 2.Blocking or customizing your cookie settings 3.Decide from which sites you want to allow cookies
Which of the following may be indications that your system has been hacked?
1.Fake e-mails or social media messages in your account 2.Unwanted browser toolbars 3.Frequent random pop-ups 4.The computer turns on or off by itself
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:
1.Passwords 2.Keystrokes 3.Account Numbers