Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When a computer is used to commit a crime it is considered a ___.

cybercrime

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an ___ nuisance

online

It is important to think before you click when you ___ software from the Web.

download

Put the following steps in the correct order for turning on Parental Controls in Microsoft Windows.

1. open 2. click 3. under 4. adjust

Put the following steps in the correct order for setting restrictions in Mac OS X.

1. select system 2. click 3. select a user

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads

Persistent cookies store information about which two of the following?

Password and username information User preferences

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

Proxy

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors. Which of the following two are these vulnerabilities?

Spectre Meltdown

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A virus that is written in a macro language and placed within a file such as a document or a spreadsheet is called a ___ virus.

macro

A type of malware that is triggered each time you boot your computer is called a

rootkit

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a ___ filter.

spam

Put the following steps in the correct order to set parental controls in Mac OS X.

1. select system 2. click 3. select a user 4. if

The software code of a particular computer virus is called the virus

signature

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

script kiddie

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

Which three of the following statements are true regarding passwords and passcodes?

Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password Keys are often generated by encryption software or by the vendor who produced the software

This is the Control Panel in Windows. Which number would you click to adjust your firewall settings?

1

Which component of a network designed to prevent unauthorized Internet intrusions?

Firewall

Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?

Sxf6512@fg%

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Unsolicited e-mail is __.

spam

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

Most fee-based software comes with technical support One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance

Which area of the Control Panel screen in Windows allows you to adjust Parental Controls?

3

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?

Button 4

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Select three true statements regarding persistent cookies.

Collect password and username information. Collect information about the Internet protocol (IP) Address. Collect information about user preferences.

Select three privacy risks associated with cookies.

Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.

address

Heuristic and signature-based detection are two techniques used by ___ software.

antivirus

A virus written in a specific language and placed within a document or spreadsheet is called a ___ virus.

macro

A virus written in a macro language and placed within a document or spreadsheet is called a _____ .

macro virus

Malware is short for ___ software.

malicious

Which of the following are online nuisances?

Spoofing Spam Spyware

A type of malware that replicates itself throughout a single computer or across a network is called a

worm

Which of the following are symptoms of an online nuisance attack?

Pop-up start appearing after you visit unfamiliar sites. Receiving a lot of spam messages or bounced back e-mail messages. Frequent pop-ups while searching the web or working in programs

To delete cookies in Safari, click ___.

Preferences

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Put the following steps in the correct order for adjusting cookie settings.

1. safari 2. preferences 3. privacy 4. change

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

First-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Cyberattacks include which three of the following?

Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.

Trojan

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____. Multiple choice question.

adware

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called

ransomware

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Which of the following three are common types of malware?

Trojans Viruses Worms

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

Put the following steps in the correct order for navigating to the Windows firewall area.

1. start 2. settings 3. update 4. windows

Which of the following three statements are true regarding macro viruses?

Commands in the macro language set off the destructive events. When file is opened the macro virus executes. Initiated by downloading and opening an infected attachment.

Which of the following are widely used tactics that can keep you safe on the Web?

Consider using a VPN Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS.

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Which three of the following you should consider in the settings area of each browser?

Decide from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

Which of the following is true about worms?

Automatically reproduces itself

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

antivirus software

A ___ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

A group of compromised computers controlled by a hacker is called a _____.

botnet

If you believe you have fallen victim to a phishing scam you should:

contact the institution the message was allegedly sent from contact US-CERT

An attack using a computer is a ___.

cyberattack

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Which 2 of the following statements are true about passwords?

Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. Check your accounts. Regularly check your accounts to ensure they have not been tampered with.

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

Hacking computer systems for politically or socially motivated purposes is called _____.

hacktivism

Which of the following three statements are true regarding keystroke loggers?

Keystroke loggers can record passwords and confidential information. Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Can be hardware devices and software applications.

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

NAT (Network Address Translation)

Which of the following three statements are true about Trojan malware?

Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves.

Adware often accompanies downloaded _____.

programs

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Software programs that hide in the operating system and allow for the installation of hidden files are called

rootkits

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ___ kiddies.

script

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

sharing an infected file inserting and opening an infected thumb drive opening an infected e-mail attachment

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

Rootkits are typically used to allow hackers to do which three of the following?

Create backdoors Install rogue files Encrypt files

Anti-virus programs

Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats.

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

e-mail virus

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called ___ hat hackers.

white

Ways to catch a computer virus

Finding a thumb drive and then using it in your laptop Downloading files from questionable Internet sites

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at ___, a company better known for its search engine and its Pixel series smartphones.

Google

Anti-malware apps

Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

What are the two common symptoms of a computer virus?

Programs launch on their own Documents will not save

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network?

Proxy servers Packet filters

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Router Computer

In Facebook, where would you click to download a copy of your Facebook data?

Settings

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

Overheating, humidity, and magnetic fields can cause damage to the __ of a digital device

hardware

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called

phishing

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

phishing keystroke logging Trojan ransomware

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .

ransomware

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Which two of the following are ways to safely download antivirus software?

Download the software from a trusted site like www.cnet.com Download the software from a known antivirus software vendor

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Which three of the following settings can you restrict in the Mac OS?

Limit access to specific websites Restrict user's access to other people through Game Center, Mail, and Messages Which apps the user can access

Which two of the following statements are true regarding firewalls?

The Mac OS includes firewall protection. Having more than one firewall app on your computer may cause conflicts and other problems.

According to US-CERT, if you receive a phishing message, which of the following methods should use to report the issue?

In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected] Contact the via the phone number listed on the US-CERT site.

Virus symptoms

The operating system does not launch properly Critical files are deleted automatically

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

blocking/allowing cookies by default. making exceptions for cookies from specific websites or domains. deleting cookies.

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

A form of spyware that records all actions typed on a keyboard is called a ___ logger.

keystroke

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

keystroke logger

Experts suggest using password ___ software to keep your passwords safe.

management

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.

Which three of the following are well-known e-mail attacks?

Ransomware Keystroke-logging Trojan Phishing

Which three of the following are well-known e-mail attacks?

Ransomware Phishing Keystroke-logging Trojan

Which three of the following may be indications that your system has been hacked?

Redirected Internet searches Unwanted browser toolbars Fake e-mails or social media messages in your account

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

Select three functions of session cookies.

Determine the start and end of a session. Determine the web browser being used. Analyze and measure traffic on a web page.

Harming or harassing via information technology and networks in a repeated and deliberate manner is called

cyberbullying

You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

Email

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

Which three of the following are factors to consider to help protect the hardware of your digital device?

Protecting a digital device from humidity Protecting a digital device from magnetic fields Protecting a digital device from overheating

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

A typical ___ manager (such as Dashlane or LastPass) is installed as a browser plug in and provides for extremely secure logins.

password

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I

password

Stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page.

session

Software that infects computers and is created using computer code is called a computer _____.

virus

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___ _. An army of these are used to launch denial of service (DoS) attacks.

zombie

Which three of the following are considered cybercrimes?

Data theft Intentional data corruption Cyberbullying

Which three of the following are ways to prevent computer virus infections?

Downloaded content from the web should only be from trusted sites. Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently.

Which three of the following statements are true about spyware?

Collects information about your Internet surfing habits and behaviors. Installed via free downloads or by visiting certain illegitimate websites. Includes the collection of keystrokes, passwords, and confidential information

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk:

Malware may be designed to do which three of the following?

Steal information Destroy data Incapacitate a computer or network

The Windows Security in Microsoft Windows is accessed by clicking Control Panel then Update and Security. Which three of the following firewall settings you can adjust by clicking Firewall & network protection?

Update your firewall settings Change notification settings Turn Windows firewall on or off

Computer viruses can infect a digital device in which three of the following ways?

Visiting a contaminated website Downloading an infected file from the Internet Opening an infected e-mail attachment

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.

Zombie

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

account numbers passwords keystrokes

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware


Set pelajaran terkait

Government Health Insurance Programs

View Set

Axial Division: Cranium & Post Cranium

View Set

Strategic Managerial Communication- Final Exam

View Set

Tema 3 pt 2: Cognicion y Emocion

View Set

Nursing Test 5: Burns, Quality Improvement, Health Policy, Patient-Centered Care

View Set