ITEC 1001 Chapter 5: Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Over heating, humidity, and magnetic fields can cause damage to the_______ of a digital device.

hardware

Common types of malware include:

virus, worm, Trojan horse, rootkit, spyware, adware

Select what's true about fee based and free antivirus software programs

- Most fee based software comes with technical support. - One of the positive of free anti-virus software is their malware detection performance.

Which of the following are common email viruses?

- Phishing - Ransomware - Keystroke-logging Trojan

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisement is called_______.

Adware

A consumer makes purchase from Overstock.com

B2C

What type f hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

Which of the following are considered intellectual property?

Patents Trademarks Trade secrets

One version of this malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This malware is called_______.

Ransomware

The TTP stand for

Trans-Pacific Partnership

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Video games Movies

A person who users computer and the Internet to launch attacks against computer systems for political or ideological reasons is called_______.

cyberterrorist

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a_______.

firewall

The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet is called_______ privacy.

internet

Persistent cookies store information about:

User preferences Password and username information

In the setting area of each browser you should consider:

- Blocking or customizing your cookie setting - Decide from which sites you want to allow cookies. - Deleting cookies.

Which of the following are factors to consider to help protect the hardware of your digital device?

- Protecting a digital device from magnetic fields. - Protecting a digital device from humidity - Protecting a digital device from overheating.

Select what's true regarding keystroke loggers.

- Software based keystroke loggers are often a Trojan that is installed without the user's knowledge. - Can be hardware devices and software applications.

Select what's true about passwords.

- The term passcode and key are synonymous for password. - Passwords can be used to secure computers, networks, software, personal accounts, and digital devices.

Put the steps of a virus inflection in the correct order.

1. The virus arrives via email attachment, file download, or by visiting an inflected site. 2. An action such as running or opening the file triggers the virus. 3. The payload is activated and the virus starts its destructive actions.

Select what's true about spyware.

- Collects information about your internet surfing habits and behaviors. - Includes the collection of keystrokes, passwords, and confidential information. - Installed via free downloads or by visiting certain illegitimate websites.

Put the steps for turning on Parental Controls in Microsoft Windows in order

1. Open Parental Controls 2. Click the standard user... 3. Under Parental Controls... 4. Adjust time limits,...

The TTP also stipulates the length of copy right terms. In the US, perpetual copyrights and patents are prohibited, but extensions to copyright are allowed. Under the TTP.... domain_______ years after the death of the creator,....

70

A deliberate misuse of computers and networks, _______ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Stored in temporary memory, ________ cookies are used to analyze and measure traffic on a web page.

session

One of the risks with cookies is_______

websites using cookies can collect your information and sell it to third parties.

Select what's true regarding keystroke loggers.

- Can record passwords and confidential information. - Software based on keystroke loggers are often a Trojan that is installed without the user's knowledge. - Can he hardware devices and software applications.

Select what's true about persistent cookies.

- Collect password and username information - Collect information about user preferences - Collect information about the IP address

Set parental controls in Mac OS X in order

1. Select System Preference,... 2. Click the lock... 3. Select a user,... 4. If the user is not in the list,...

Software that inflects computers and is created using computer code is called a computer_______.

Virus

A virus that is attached in a file in and sent via email message is called a(n)_______ virus.

email

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a_______.

hacker

Which of the following are ways to prevent computer virus infection?

- Web surfing should be limited to trusted sites. - Downloaded content from the web should only be from trusted sites. - Install the latest antivirus software and update frequently.

Which of the following are ways to prevent computer virus infections?

- Web surfing should be limited to trusted sites. - Install the latest antivirus software and update frequently. - Downloaded content from the web should only be from trusted sites.

A category of cyberterrorism that focus on hacking computer system for political or socially motivated purposes is_______.

hacktivism

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as_______ cookies.

persistent

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network_______ Translation provides a type of firewall protection by hiding internal IP addresses.

address

A form of protection provided by the laws of the US for "original works of authorship", including literacy, dramatic, etc is called a_______.

copyright

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

A form of spyware that records all actions typed on a keyboard is called a_______ logger.

keystroke

A virus written in a specific language and placed within a document or spreadsheet is called a_______ virus.

macro

Which of the following are symptoms of an online nuisance attack?

- Receiving a lot of spam messages or bounced back email messages. - Pop-up start appearing after you visit unfamiliar sites. - Frequent pop-up while searching the web or working in programs.

On the Privacy tab in Internet Explorer you can adjust which settings?

- What types of cookies are blocked or allowed - Override your privacy setting for certain types of cookies. - Block or allow specific websites.

Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a_______ filter.

spam

A destructive program that replicates itself throughout a single computer or across a network is called a_______.

worm

Malware is short for _______ software.

malicious

A secret code used to help prevent unauthorized access to data and user accounts is called a_______.

password

Safari accepts cookies and website data from which of the following?

Only from websites you visit

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as_______.

Pharming

What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

Proxy

Spam messages are sometimes referred to as _______.

UBE

The organization below that you should contact if you receive a phishing message.

US-CERT

Software programs that hide in the operating system and allow for the installation of hidden files are called_______.

Rootkits

Safety-shield employs computer experts who test the security measure of an organization's information system to ensure they are protected against instruction. These Safety-shield employees are called______.

White hat hackers

A computer controlled by a hacker is called a_______.

Zombie

A computer program that scan files to identify and remove computer viruses and other malicious programs is called_____.

antivirus software

Derived from the Greek word ergon and nomoi, _______ is an important element of workplace safety.

ergonomics

Typically computer viruses must be_______ to attack and do damage to a digital device.

run

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Cyberattacks include:

DDoS attacks Identity theft Pharming

The acronym DDoS stand for

Distributed Denial of Service

A digital identity is composed of a variety of digital attributes including:

- online search activities - usernames and passwords - personal data such as your social security number and birth date

According to Mozilla, one of the most efficient ways to clear cookies in Firefox is:

1. Click the menu button,... 2. Once you have cleared recent history... 3. Click on the arrow... 4. Select Cookies... 5. Click Clear Now...

Which of the statements below are true about ergonomics?

- A very important element... - The study of human interaction... - Derived from the Greek...

Which of the following can help prevent a virus inflection?

- Adjust your web browser's security settings to allow browsing only on trusted sites. - Never bypass your browser's built-in security features.

Which of the following are cookie settings you can adjust in Internet Explorer?

- Allow cookie - Block cookie - Delete cookie - Customize cookie

The TTP covers just under_______ percent of global GDP.

40

In an ergonomically correct workstation, your keyboard should be.... Arms should be positioned at a_______ degree angle.

45

Alberstson's grovery store places...

B2B

Signed into law the President Clinton in 1998. The_______ Millennium Copyright Act...

Digital

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _______ attack.

DoS

Antivirus programs uses a variety of technique to identify and remove viruses and malware. Two of the most common technique are:

Heuristic-based detection Signature-based detection

The titles in the DMCA that directly impact digital copyright issues are:

Title 1,2,3

You should consider where/how you place the following to create an ergonomically correct workstation, which includes:

Keyboard Chair Monitor

The technology that provides a type of firewall protection by hiding internal IP addresses is called_______.

NAT

Which of the following are online nuisances?

Spam Spyware Spoofing

The TTP was negotiated by 12 countries including:

The US Canada Brunei

Identify common symptoms of a computer virus

-Documents won't save -Computer runs extremely slowly -Programs launch on their own

You can change your Firefox setting to allow you to:

- Delete stored cookies automatically when you start Firefox. - Approve cookies storage requests. - Deny cookie storage requests.

Select the functions session cookies

- Determine the start and end of a session - Determine the web browser used - Analyze and measure traffic on a web page

Computer infected with a virus exhibit many symptoms including:

- Files get deleted or encrypted - OS does not launch property - Strange error messages or pop-up ads.

Select what's true about macro virus.

- Initiated by downloading and opening an infected attachment. - When file is opened the macro virus executes. - Commands in the macro language set off the destructive events.

There are a variety of cookie setting that can be adjusted in Google Chrome including:

- Making exception for cookies from specific websites or domains - Deleting cookies - Blocking/ allowing cookies by default

Which of the following are steps of how a virus inflects a computer?

- An action such as running or opening a file activates the virus. - Once activated, the virus copies itself into files and other location on your computer. - The virus arrives via email attachment, file download, or by vising a website that has been inflected.

Put the steps for adjusting cookie setting in the proper order.

1. Choose Safari 2. Click Preferences 3. Click Privacy 4. Change cookie settings

Put the steps to have Firefox block cookies from one website in the correct order

1. Go to the website... 2. Right-click... 3. In the Page Info... 4. Underneath Set Cookies,...

According to Microsoft, what is the correct order of steps to Accept All Cookies in Internet Explorer?

1. Open Internet Explorer 2. Click the Tool icon 3. Click Internet options 4. Click the Privacy tab 5. Under Setting,... 6. Click Apply

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called_______.

Quarantine

Small text files created by websites you visit that your web browser stores on your hard disk is called_______.

cookies

Illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called_______.

phishing

A group of compromised computers controlled by a hacker is called a_______.

Botnet

A consumer makes arrangements to buy used....

C2C

Which of the following are considered e-commerce transactions?

C2C B2C B2B

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a_______.

Trojan

Select what's true about worms

Automatically reproduces itself

Transaction conduced between established businesses and consumers such as purchasing a book from Amazon.com is considered a business-to-_______ transaction.

consumer


Set pelajaran terkait

ASL- Greetings and some other signs

View Set

ECON 2302.1003 CHAPTER 2 OVERLOOK

View Set

INFECTION CONTROL/CHAIN OF INFECTION

View Set

Mental Health Pharmacology practice questions

View Set