computer security
a virus written in a macro language and placed within a document or spreadsheet is called a
macro virus
experts suggest using password ___ software to keep your passwords safe
management
stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as ___ cookies
persistent
keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
according to US-CERT if you receive a phishing message you should contact them using which of the following methods?
contact them either via email or phone
this is the options tab in Mozilla Firefox. where would you click to adjust cookie settings
privacy
a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___
cyberattack
what type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network
proxy
adware often accompanies downloaded
programs
this is the system and security area that is accessed by clicking control panel>system and security. when you click windows firewall, what are some of the firewall settings you can adjust?
- turn windows firewall on or off - update your firewall settings - changes notification settings
A detractive program that replicates itself throughout a single computer or across a network is called a
worm
*only have on firewall*
*could lead to issues if you have more than one*
computers infected with a virus exhibit many symptoms including
- OS does not launch properly - files get deleted or encrypted - strange error messages or pop-up ads
virus
- Trojan horse - worm - macro
on-foing series of events cybercrimes
- blackmail - cyberstalking
the privacy risks associated with cookies
- corporate and government entities can track your web behavior - websites can track your surfing behavior and create a profile - websites using cookies can collect your information and sell it to a third parties
you can change your Firefox settings to allow you to
- deny cookie storage requests - delete stored cookies automatically when you start firefox 0 approve cookies storage requests
the functions of session cookies
- determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used
which of the following are ways to safely download antivirus software
- download the software from a trusted sit like www.cnet.com - download the software form a known anti-virus software vendor
cyberattacks include
- identity theft - pharming - DDOS attacks
what is true about packet sniffers
- legitimate sniffers are used for routine examination and problem detections - unauthorized sniffers are used to steal information
the correct statements about fee based antivirus and free anti-virus software
- most of the free anti-virus programs perform almost as effectively as their fee-based counterparts - one of the main differences between free and anti-virus software is the number of features ------------ incorrect!!! one of the positives of free anti-virus software is their spam detection performance
on the privacy tab in internet explorer you can adjust which settings?
- override your privacy settings for certain types of cookies - block or allow specific websites - what types of cookies are blocked or allowed
which of the following re factors to consider to help protect them hardware of your digital device
- protecting a digital device from humidity - protecting a digital device from magnetic fields - protecting a digital device from overheating
which of the following are common email viruses?
- ransomware - phishing - keystroke-logging trojan
cyberattacks
- rootkit - packet analyzer - DOS attack
antivirus programs use a variety of techniques to identify and remove viruses and malware. two of the most common techniques are
- signature-based detection - heuristic-based detection
which of the following are online nuisances?
- spam - spoofing - spyware
what is true about passwords
- the term passwords and key are synonymous for passwords - passwords can be used to secure computers, networks, software, personal accounts, and digital devices
put the steps for adjusting cookie settings in proper order
1. choose safari 2. click preferences 3. click privacy 4. change cookie settings
according to Mozilla, one of the most efficient ways to clear cookies in Firefox is
1. click the menu button, choose history, and then clear recent history 2. once you have to cleared recent history you should set the time range to clear everything 3. click on the arrow next to details to expand list of history items 4. select cookies and make sure that other items you want to keep are not selected. close the clear recent history window 5. clear clear now to clear cookies
according to Microsoft, what is the correct order of steps to accept all cookies in internet explorer?
1. open internet explorer 2. click the tools icon 3. click internet options 4. click the privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply
most efficient way to block cookies is
1. open the desktop, and then tap or click the internet explorer icon on the task bar 2. tap or click the tools bar, and then tap or click internet options 3. tap or click the privacy tab, and under settings, move the slider to the top to block all cookies, and then tap or click OK
put the remaining steps required to set parental controls in Mac OS X in the correct order
1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. in the user is not in the list, click add, then fill in the name, account, and password information to create a new user
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ___ attack
DoS
the technology that provides a type of firewall protection by hiding internal IP address is called
NAT (network address translation)
a program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus
Trojan
spam messages are sometimes called ___ and are used for a variety of marketing purposes including selling products and services
UBE
developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses
address
on a Macintosh home screen, where do you click to access to adjust parental control settings?
apple and settings
A group of compromised computers controlled by a hacker is called a
botnet
after you have clicked on the privacy tab in safari, which of the following are way to efficiently remove cookies and stored data?
click- remove all website data, or click details then select one or more websites, then click remove
spyware is
considered an online nuisance
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym DDoS stands for
distributed denial of service
trojan malware
doesn't replicate themselves
a virus is attached in a file in and sent via email message is called a ___ virus
hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a
firewall
which tab would you click to delete cookies?
general
a category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purpose is
hacktivism
overheating, humidity, and magnetic fields can cause damage to the ___ of a digital device
hardware
black hat hackers
intent to be mean sad face
firewall software used to block a user's access to specific internet content is called a ___ filter
internet
a form of spyware that records all actions typed on a keyboard is called a ___ logger
keystroke
a virus written a specific language and placed within a document or spreadsheet is called a ___ virus
macro
safari accepts cookies and website data from which of the following?
only from websites you visit
computers viruses typically must be ___ to attack and do damage. viruses can destroy programs or alter the operation of a computer or network
opened
which area of the control panel screen in windows 7 allows you to adjust parental control?
other users
where would you click in the view page info screen in Mozilla Firefox page that allows you to access the area that allows you to block cookies
permissions
creating a fake webpage to trick victims into divulging personal information is a type of phishing known as
pharming
illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a blank, or insurance company is called
phishing
below is an image of the internet options tab in internet explorer. which tab should you click to block cookies in internet explorer?
privacy
in 2017, wanna cry infected nearly 250,000 computers in one day. in malware encrypted victims data files and demanded payment for decryption code. this type of malware is called
ransomware
a worm is a type of malware that ___ itself throughout a single computer or across a network
replicates
worms
reproduce type o thing
a type of malware that is triggered each time you boot your computer is called a
rookit
specialized hardware or software that capture packets transmitted over a network are called packet
sniffers
DeSean received an unsolicited email message from an unknown sender. this email was
spam
ted installs computers software designed to prevent spam messages from entering his email inbox. this type of software is called a ___ filter
spam
unsolicited email is
spam
software that collects information about your internet surfing habits and behaviors is called
spyware
phishing
tricks users into revealing usernames and passwords by appearing legitimate
ransomeware
when activated, encrypts files on user hard drive and then sells a decryption program
spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies
word
a type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
pharming
once the virus is identified the antivirus software attempts to remove the virus from the file. if the software cannot remove the infected file it will send the file to an isolated area on the hard disk called
quarantine
if you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___ mode
safe
stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page
session
what type of cookie is stored in temporary memory and is lost when the web is closed?
session
this is the settings area of google chrome. where would you click to adjust cookie and site data permissions?
show advanced settings
the software code of a particular computer virus is called the virus
signature
first party cookie
small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
web cookies
small text file of information created by websites you visit that your web browser stores on your hard drive
third party cookie
small text file of information. created by a website other than the one you currently visiting and are used to track your surfing habits and are considered an invasion of privacy
single event cybercrimes
- phishing - Trojan horse - keystroke logger
which of the following are symptoms of an online nuisance attack?
- pop up start appearing after you visit unfamiliar sites - receiving a lot of spam messages or bounced back email messages - frequent pop-ups while searching the web or working in programs
what is true regarding keystroke loggers
- keystroke loggers can record passwords and confidential information - can be hardware devices and software applications - software based keystroke loggers are often a trojan that is installed without the user's knowledge
typical firewall programs or hardware devices filter all information coming through the internet to your network or computer system. there are a variety of techniques that are used to minimize the risk of harmful infusion into a computer or network including
- packet filters - proxy servers
identify what is true about script kiddies
- amateur computer hackers with the little programming expertise - illegally gain access to computer systems using programs (script) that others have written
what are the symptoms that your system has been hacked?
- unwanted browser toolbars - redirected internet searches - fake emails or social media messages from your account