ITEC Chapter 5 - Cyber Security
Rootkits allow remote users to do what?
Create backdoors that bypass securities, delete files, and install rogue riles
A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___:
Cyberattack
Deliberate misuse of computers and networks, ___ use malicious code to modify the normal operations of a computer network:
Cyberattacks
What's ransomware?
Encrypts files on user's hard drive, then sells decryption program
What are some common symptoms of a computer virus?
Programs launch on their own or documents won't save
Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. T or F?
True
The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998. The act implements two World Intellectual ___ Organization treaties:
Property
What terms are associated with "online nuisances"?
1. Spam 2. Adware
Online nuisances include:
1. Spam 2. Spyware 3. Phishing and Pharming 4. Trolling and Spoofing
Software programs that hide in the operating system and allow for the installation of hidden files are called:
Rootkits
What's a keystroke-logging Trojan?
Saves all keystrokes for subsequent transmission to virus creator
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
Session cookies
Computer software that's designed to prevent spam messages from entering into a user's e-mail box is called a ___ filter:
Spam
One version of malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This is called ___:
Ransomware
If the investigation from the bank determines that those transactions were fraudulent, your bank must replace the funds within ___ business day(s):
1
Which of the following are online nuisances? 1. Spyware 2. Spam 3. First party cookies 4. Spoofing
1, 2, and 4
The fastest way to clear cookies in Firefox is...:
1. Set "time range" to clear in "everything" 2. Click on the arrow next to "details" 3. Select "cookies" 4. Click "clear now" and close the "clear recent history" window
What's true about ergonomics? 1. Fits the user to the task instead of fitting the task to the user 2. Derived from the greek words ergon (work) and nomoi (natural laws) 3. Study of human interaction with the objects they use 4. An important element of an effective workplace safety plan
2, 3, and 4
What's true about persistent cookies? 1. Stored in temporary memory and are lost when the web browser is closed 2. Collect info. about user preferences 3. Collect info. about the IP address 4. Collect pass and username info.
2, 3, and 4
The TPP covers just under ___ percent of global GDP:
40
Under the TPP, copyrighted works will pass into the public domain ___ years after the death of the creator, extending the term for some countries like New Zealand by a further 20 years:
70
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses:
Address
Displaying ads based on profiles and browsing history is an online nuisance called ___:
Adware
A group of compromised computers controlled by a hacker is called a ___:
Botnet
A hacker launches an attack on a network that's designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a ___ attack:
DoS
Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are...:
Heuristic-based and signature-based detection
Firewall software used to block a user's access to specific internet content is called a(n) ___ filter:
Internet
A form of spyware that records all actions typed on a keyboard is called a ___ logger
Keystroke
Tech that provides a type of firewall protection by hiding internal IP addresses is called ___:
NAT (network address translation)
On ___ in the U.S., the liability of paying for the fraud will fall on the party that is least chip-enabled:
October 1, 2015
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___:
Pharming
The illegitimate use of an email message used to collect personal info. and appears to be from an established organization is called ___:
Phishing
Passports issued by the U.S. and many other countries include ___ chips:
RFID
A worm is a type of malware that ___ itself throughout a single computer or across a network:
Replicates
A type of malware that's triggered each time you boot your computer is called a ___:
Rootkit
Typically computer viruses must be ___ to attack and do damage to a digital device:
Run
Specialized soft/hardware that capture packets transmitted over a network are called packet ___:
Sniffers
Software that collects information about your internet surfing habits and behaviors is called ___:
Spyware
Malware is designed to do what?
Steal information, incapacitate a computer or network, and destroy data
The TPP stands for what?
Trans-Pacific Partnership
What's phishing?
Tricks users into revealing usernames and passwords
A program that appears legit, but executes unwanted activity when activated is called a ___ horse virus:
Trojan
If you receive a phishing message, who should you contact?
US-CERT
A computer controlled by a hacker is called a ___:
Zombie
What's true about sniffers? 1. Unauthorized sniffers are used to steal info. 2. Use viruses 3. Can be difficult to detect 4. Legitimate sniffers are used for routine examination and problem detection
1 and 4
What's true about keystroke loggers? 1. It can be hardware or software 2. Can record passwords and confidential info. 3. Usually a Trojan that's installed without the user's knowledge 4. They can't monitor employees
1, 2, and 3
What's true about macro viruses? 1. Initiated by downloading and opening an infected attachment 2. Commands in the macro language set off the destructive events 3. When file is opened, the macro virus executes 4. Usually found in MP4 files
1, 2, and 3
What kind of e-commerce transactions are these? 1. Consumer makes a purchase from a site 2. Consumer makes arrangements to buy a used snowboard with another user on the same site 3. A grocery store places an order for goods
1. B2C 2. C2C 3. B2B
What terms are associated with the word "hacker"?
1. Black hats 2. Script kiddies 3. Cyberterrorists
Cyberattacks include:
1. DOS attack 2. Packet Analyzer 3. Rootkit
Viruses include:
1. Macro 2. Trojan horse 3. Worm
After you tell your bank about the fraudulent charges, it has ___ business days to investigate:
10
Software programs that hide in the operating system and allow for the installation of hidden files are called ___:
Rootkits