Computer Security
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber
terrorist
A _______ hat hacker breaks into computer systems with the intent of causing damage or stealing data
black
A destructive program that replicates itself throughout a single computer or across a network is called a _
worm
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a
hacker
If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.
False
Help protect against worms and hackers: Firewall programs help protect against worms and hackers
Firewalls
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a
password
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a
cyberattack
Which two of the following statements are true regarding firewalls?
-The Mac OS includes firewall protection. -Having more than one firewall app on your computer may cause conflicts and other problems
Small text files created by websites you visit that your web browser stores on your hard disk are called
cookies
Which three of the following you should consider in the settings area of each browser?
-Blocking or customizing your cookie settings -Decide from which sites you want to allow cookies -Deleting cookies
Which of the following may be indications that your system has been hacked?
-Fake e-mails or social media messages in your account -Unwanted browser toolbars -Redirected Internet searches -The computer turns on or off by itself
Which three of the following are factors to consider to help protect the hardware of your digital device?
-Protecting a digital device from humidity -Protecting a digital device from overheating -Protecting a digital device from magnetic fields
Which 2 of the following statements are true about passwords?
-Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. -Check your accounts. Regularly check your accounts to ensure they have not been tampered with
Select three privacy risks associated with cookies
-Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior. -Websites using cookies can collect your information and sell it to third parties
Help protect against malware: These apps help protect against a variety of malicious programs
Anti-malware apps
Help protect against viruses: These programs help to protect your system from a variety of virus threats.
Anti-virus programs
The technology that provides a type of firewall protection by hiding internal IP addresses is called
NAT
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ____ , Translation provides a type of firewall protection by hiding internal IP addresses.
address
The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
Harming or harassing via information technology and networks in a repeated and deliberate manner is called
cyberbullying
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
cybercrime
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
Which component of a network designed to prevent unauthorized Internet intrusions?
firewall
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n)
trojan
An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
-router -a user's computer -network (server)