CIS Ch 11 Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Select three true statements regarding persistent cookies.

Collect information about the Internet protocol (IP) Address. Collect password and username information. Collect information about user preferences.

Which three of the following you should consider in the settings area of each browser?

Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Cyberattacks include which three of the following?

Pharming Identity theft using a computer or network Distributed denial-of-service (DDOS) attacks

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Proxy servers Packet filters

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Computer Router

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

An attack using a computer is a ___.

cyberattack

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page.

session

Select three privacy risks associated with cookies.

Websites using cookies can collect your information and sell it to third parties. Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile.

Put the following steps in the correct order to set parental controls in Mac OS X.

1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. if the user is not in the list, click add, then fill in the name, account, and password information to create a new user

Select three functions of session cookies.

Determine the web browser being used. Analyze and measure traffic on a web page. Determine the start and end of a session.

Match the following terms about web cookies to their proper description.

Web cookie: Small text file of information created by websites you visit that your web browser stores on your hard disk First-party cookie: Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session Third-party cookie: Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.

Put the following steps in the correct order for turning on Parental Controls in Microsoft Windows.

1. open parental controls 2. click the standard user account that you want to set parental controls for 3. under parental controls click on then enforce current settings 4. adjust time limits, access to specific programs, access to specific websites

Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.


Set pelajaran terkait

World Regional Geography: Module 4

View Set

Chapter 27 Multiple choice questions

View Set

A&P Chapter 26 female reproductive system

View Set

Macroeconomics Assignment 8 Multiple Choice

View Set