Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

A _______ hat hacker breaks into computer systems with the intent of causing damage or stealing data

black

A destructive program that replicates itself throughout a single computer or across a network is called a _

worm

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

Help protect against worms and hackers: Firewall programs help protect against worms and hackers

Firewalls

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a

password

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

Which two of the following statements are true regarding firewalls?

-The Mac OS includes firewall protection. -Having more than one firewall app on your computer may cause conflicts and other problems

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

Which three of the following you should consider in the settings area of each browser?

-Blocking or customizing your cookie settings -Decide from which sites you want to allow cookies -Deleting cookies

Which of the following may be indications that your system has been hacked?

-Fake e-mails or social media messages in your account -Unwanted browser toolbars -Redirected Internet searches -The computer turns on or off by itself

Which three of the following are factors to consider to help protect the hardware of your digital device?

-Protecting a digital device from humidity -Protecting a digital device from overheating -Protecting a digital device from magnetic fields

Which 2 of the following statements are true about passwords?

-Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. -Check your accounts. Regularly check your accounts to ensure they have not been tampered with

Select three privacy risks associated with cookies

-Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior. -Websites using cookies can collect your information and sell it to third parties

Help protect against malware: These apps help protect against a variety of malicious programs

Anti-malware apps

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

Anti-virus programs

The technology that provides a type of firewall protection by hiding internal IP addresses is called

NAT

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ____ , Translation provides a type of firewall protection by hiding internal IP addresses.

address

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Harming or harassing via information technology and networks in a repeated and deliberate manner is called

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Which component of a network designed to prevent unauthorized Internet intrusions?

firewall

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n)

trojan

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

-router -a user's computer -network (server)


Set pelajaran terkait

Income Approach to Valuation + WACC

View Set

Psychology Chapter 3: Biopsychology Quiz

View Set

Law - Exam #1 Readings Master Set

View Set

Intro to Policing Chapters 9, 10, 12, & 13

View Set