Part 2 - Cybersecurity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Select all that apply Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

Select all that apply Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Authentication Encryption Access control

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

Availability

Virus symptoms

The operating system does not launch properly Critical files are deleted automatically

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

A group of compromised computers controlled by a hacker is called a _____.

botnet

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a .

cyberattack

An attack using a computer is a ___.

cyberattack

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist

Select all that apply There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

deleting cookies making exceptions for cookies from specific websites or domains blocking/allowing cookies by default.

Select all that apply You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. delete stored cookies automatically when you start Firefox. approve cookies storage requests.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

distributed denial of service

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) _____.

email

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

email virus

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______.

hacker

A form of spyware/surveillance technology that records all typed actions is referred to as a ___.

keystroke logger

Select all that apply Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

keystroke logging Trojan phishing ransomware

Select all that apply Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

keystrokes account numbers passwords

Malware is short for software.

malicious

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

malware

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I

password

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _____

pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called _______.

pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ___.

pharming

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called ________.

phishing

Adware often accompanies downloaded _____.

programs

Some particularly troublesome malware encrypts files and then the hacker offers to sell the decryption code to the victim. This malware is called___ .

ransome

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called ________

ransomware

A type of malware that is triggered each time you boot your computer is called a ______

rootkit

How do computer viruses attack? Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page.

session

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate

A program that appears legitimate but executes an unwanted activity when activated is commonly called a __.

Trojan

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

Select all that apply Which of the following three are common types of malware?

Trojans Viruses Worms

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

Select all that apply Select two true statements about packet sniffers.

Unauthorized sniffers are used to steal information. Legitimate sniffers are used for routine examination and problem detection.

Select all that apply Which of the following are widely used tactics that can keep you safe on the Web?

Use your browser's private browsing mode. Consider using a VPN Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS.

Select all that apply Computer viruses can infect a digital device in which three of the following ways?

Visiting a contaminated website Downloading an infected file from the Internet Opening an infected e-mail attachment

Select all that apply Which three of the following are ways to prevent computer virus infections?

Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently. Downloaded content from the web should only be from trusted sites.

This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?

Button 4

Select all that apply Select three true statements regarding persistent cookies.

Collect information about user preferences. Collect information about the Internet protocol (IP) Address. Collect password and username information.

Select all that apply Rootkits are typically used to allow hackers to do which two of the following?

Create backdoors Install rogue files

Select all that apply Which three of the following are considered cybercrimes?

Cyberbullying Intentional data corruption Data theft

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

Select all that apply Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

Data are regularly backed up. Data correction codes are used to ensure the data retrieved are the same as when it was stored.

Select all that apply Select three functions of session cookies.

Determine the web browser being used. Analyze and measure traffic on a web page. Determine the start and end of a session.

Select all that apply Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

Anti-malware apps

Help protect against malware: These apps help protect against a variety of malicious programs.

Anti-virus programs

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

Firewalls

Help protect against worms and hackers. Firewall programs help protect against worms and hackers

Select all that apply Malware may be designed to do which three of the following?

Incapacitate a computer or network Steal information Destroy data

Select all that apply Which of the following three statements are true about Trojan malware?

Often found attached to free downloads and apps. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves.

Select all that apply Persistent cookies store information about which two of the following?

Password and username information User preferences

Select all that apply Cyberattacks include which three of the following?

Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network

Select all that apply Which of the following two statements best describe phishing?

Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Private

Select all that apply Which three of the following are well-known e-mail attacks?

Ransomware Keystroke-logging Trojan Phishing

first-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

Select all that apply The use of cookies allows you to do which of the following?

Surfacing of local (geotargeted) content Store site preferences Remain signed into websites

Select all that apply Which of the following may be indications that your system has been hacked? (Select all that apply.)

The computer turns on or off by itself Fake e-mails or social media messages in your account Unwanted browser toolbars Frequent random pop-ups

Ransomeware

When activated, encrypts files on user hard drive and then sells a decryption program

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ____. An army of these are used to launch denial of service (DoS) attacks.

Zombie

Select all that apply Select 3 ways in which computer virus commonly infect vulnerable digital devices.

inserting and opening an infected thumb drive opening an infected e-mail attachment sharing an infected file

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Specialized hardware or software that capture packets transmitted over a network are called packet ______

sniffer

DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was

spam

Select all that apply What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Ways to catch a computer virus

Downloading files from questionable Internet sites Finding a thumb drive and then using it in your laptop

Select all that apply Which three of the following statements are true about spyware?

Installed via free downloads or by visiting certain illegitimate websites. Collects information about your Internet surfing habits and behaviors. Includes the collection of keystrokes, passwords, and confidential information

Select all that apply Which three of the following statements are true regarding passwords and passcodes?

Keys are often generated by encryption software or by the vendor who produced the software Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password

Select all that apply In Firefox, cookies can store a wide range if information including which of the following?

Name Email address Home address

Select all that apply Which of the following three statements are true regarding keystroke loggers?

Software-based keystroke loggers can be installed by Trojans without the user's knowledge. Keystroke loggers can record passwords and confidential information. Can be hardware devices and software applications.

Select all that apply Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.

Storing data on multiple hard drives. Ensuring that the data server has an appropriate amount of bandwidth. Having standby equipment available to take over in a situation where the main system fails.

Put the following steps of a virus infection in the correct order.

1. The virus arrives via email attachment file download, or by visiting an infected site 2. An action such as running or oopening the file triggers the virus. 3. The payload is activated and the virus starts its destructive actions.

Select all that apply According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

A company has a long-standing policy to disable the usernames and passwords for executives after their employment has ended, but not for lower level employees who have left the company. During an acquisition, logistics data are securely transferred to the acquiring company's servers.

Select all that apply When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

Access control Authentication

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

Access to important data is limited so that only certain employees are able to modify that data. During an acquisition, logistics data are securely transferred to the acquiring company's servers.

Select all that apply An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Computer Server

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

When you open the options tab in Firefox, after you select the menu button, where would you click to adjust cookie settings?

Settings

third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

Software that illicitly collects information about your Internet surfing habits and behaviors is called ______

spyware

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber _____.

terrorist

Where do you click to adjust cookie settings in Edge? To adjust cookies in Edge, where would you click first?

the 3-dot "Settings and more" icon

A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.

trojan

Software that infects computers and is created using computer code is called a computer _____.

virus

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

An army of these are used to launch denial of service (DoS) attacks or an apocalypse!

zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie


Set pelajaran terkait

Business Communications Ch.7+8 Study Guide

View Set

FIRE 449 Chapter 18 Quiz Questions

View Set

Chemistry: chapter 14 (first set of 15)

View Set