Computer Security Quiz - 96%
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____. -driver -cookie -app -spam
cookie
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ . -cyber-intruder -cyber-threat -cyberattack -app
cyberattack
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____. -snoop -hacker -trespasser -zombie
hacker
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies. -session -data -database -persistent
persistent
An unsolicited email message is called _____. -spyware -phishing -pharming -spam
spam
Persistent cookies store information about -user preferences -utility programs -operating system configuration -web site preferences
user preferences
Software that infects a computer and is created using computer code is called a computer _____. -virus -attack -application -spam
virus
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack. -virus -zombie -worm -DDos
*DDos*
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ . -email -adware -worming -spoofing
adware
Which of the following would be considered a cybercrime? -3rd party cookies -data manipulation -spam -adware
spam
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___. -terrorist -cyberterrorist -hacker -cyberattacker
cyberterrorist
Specialized hardware or software that capture packets transmitted over a network are called packet _____. -snoops -sniffers -snakes -analyzers
sniffers
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____. -router -switch -NAT -firewall
firewall
A form of spyware that records all actions typed on a keyboard is called a _____ logger. -keystroke -input -command -touch
keystroke
What is the name of a virus written in a macro language and placed within a document or spreadsheet. -polymorphic virus -macro virus -micro virus -memory resident viruses
macro virus
A group of compromised computers controlled by a hacker is called a _____. -cyborg -botnet -netsys -network
botnet
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___. -cyber security specialists -white hat hackers -black hat hackers -cyber analysts
white hat hackers
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____. -cybercrime -cyberbullying -cyberstalking -cyberattack
cybercrime
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____. -activism -hacktivism -Adwaru -digi-terrorism
hacktivism
A destructive program that replicates itself throughout a single computer or across a network is called a _____. -worm -DoS -DDoS -zombie
worm
A computer controlled by a hacker is called a _____. -zombie -virus -cyborg -robot
zombie
Is a virus the only way cyber criminals can steal a person's identity? -Yes, so if a person is careful about using and updating his or her anti-virus software, he or she doesn't have to worry. -No—you can also catch a virus during denial of service attacks. -One way you risk identity theft is if you block pop-up windows. -No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated.
No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated.
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____. -techbullying -cyberbullying -malware -cyberattacking
cyberbullying
What is a virus? -A computer virus is a computer program that appears to be something useful or desirable (like a game or a screensaver), but at the same time does something malicious in the background without your knowledge, such as destroying your files. -A computer virus is a computer program that looks at packets as they travel on the Internet and infects them with debilitating code. -A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged. -A computer virus is a computer program deployed by hackers that looks at each packet as it travels on the Internet.
A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.
What should users do if they get a popup threatening them that their system is at risk and that they need to buy a particular product to ensure its protection? -They should follow the instructions they see right away to make their system secure. -Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses. -Check your email to see if the company has contacted you and follow the instructions in the email. -Change your credit cards to protect yourself.
Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ . -Distributed Denial of Service -Developed Denial of Security -Distributed Denial of Secuirty -Developed Denial of Service
Distributed Denial of Service
If a Microsoft Excel file is all garbled, could it have a virus? -It definitely has a virus. The user needs to run antivirus software. -It could be a virus, but it could also be another problem, such as a corrupt file. -The Excel application itself is corrupt. -If the Excel file can't open in a previous version of Excel, it is a virus.
It could be a virus, but it could also be another problem, such as a corrupt file.
Is it safe to click on links that come in email from companies you know? -Yes—if you recognize the logo then you can go ahead and click on links inside the email safely. -As long as you know that you are a customer of that company, it is safe to follow links in their emails to you. -No, it is not safe. It is a better practice to go to the website yourself and login there. -Email systems have filters, so any email you get is safe to read and to use the links inside it.
No, it is not safe. It is a better practice to go to the website yourself and login there.
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter. -Internet -malware -safety -content
internet
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ . -spoofing -pharming -farming -trolling
pharming