Security Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

is a program that looks for known viruses and strives to disable found viruses, by searching a hard drive, and/or by monitoring visited websites and downloaded files.

Antivirus software

_________is software that provides protection against computer viruses and many other forms of malware.

Antivirus software, also known as antimalware,

is the prevention of unauthorized computer access, including viewing, changing, or destroying a computer or data.

Computer security

______________________ involves converting a message into an unreadable form , and converting that message back into a readable form, using secret conversion techniques that only the sender and intended receiver know.

Cryptography

A software firewall prevents all communications with the computer on which the firewall is installed. True/False

False

Antivirus software allows a user to download files from email and websites without worry. True/False

False

Malware is a type of virus. True/False

False

Symmetric-key cryptography ensures only the sender and receiver know the contents of a message. t/f

False

A trojan spreads itself from computer to computer. True/False

False.Unlike viruses and worms, trojan software does not spread itself. Rather, a user intentionally installs the software, believing the software to be safe to use.

A file exhibits suspicious behavior that acts similarly to known infected files, but does not exactly match the behavior of any known viruses.

Heuristic analysis. Antivirus software can use heuristics to analyze the behavior of suspicious files based on the behavior of known viruses.

An _________________ is a dishonest scheme or fraud using the Internet.

Internet scam

____________ is undesired software that is typically installed without a user's knowledge and typically bad for the computer or user.

Malware (short for "malicious software")

___________ is an Internet scam that baits a user to share sensitive information like a password or credit card number.

Phishing

A file exhibits suspicious behavior on a specific user's computer.

Sandbox. Sandboxing in antivirus software allows specific environments to be created for testing a suspicious file's behavior.

Which are ways of improving online account security?

Signing out whenever leaving a computer unattended. Immediately changing passwords if a computer is stolen. For a personal device, enabling a device's screen lock mechanism. Deleting old email messages. Changing passwords frequently.

_______ is unsolicited mass email, perhaps advertising prescription drugs for sale, or further spreading the virus.

Spam

________ is unwanted mass-sent email

Spam

is malware that collects information from a computer without the user's knowledge.

Spyware

_________ is malware that a user installs believing the software to be legitimate or benign, but the software actually has a malicious purpose.

Trojan horse

A common phishing scheme involves emails that inform a user of a frozen financial account, and require the user to provide information to unfreeze the account. True/False

True

A security hole is a weakness in a system that may lead to a security breach. T/F

True

A security hole may exist in software other than just an operating system. True/False

True

A user actually installs trojan software intentionally, not realizing the trojan is malware. T/F

True

Malware is relatively rare on smartphones and tablets compared to desktop computers. True/False

True

Security breaches can be caused by hacks, system glitches, or human error. True/False

True

Spammers may advertise a legitimate business. True/False

True

The difference between a worm and a virus is that a worm doesn't use a host file. True/False

True. A virus is attached to an email, an office document, etc. A worm spreads without such attachment, spreading from computer to computer without requiring user action.

Adware displays advertisements to a user. True/False

True. Adware can be annoying to the user who sees unwanted ads while browsing the web or reading emails, for example, and may slow down a computer also.

_______ helps secure a user's account by requiring the user during sign in to enter a temporary code appearing on the user's mobile phone, which the user usually carries.

Two-step verification

_______ is malware that spreads itself via attachment to a host file, like a biological virus attaches to a human.

Virus

A file is infected with a known virus.

Virus Signature. The virus signatures of known viruses are stored in a database. Antivirus software can use this database to find and eliminate known viruses.

_______is malware that spreads itself without using a host file.

Worm

A legitimate user that tries to access a website that is under a DoS attack might notice _____. a. slow response or no response b. nasty messages from the attacker

a. slow response or no response

_____ is/are unsolicited mass email. a. Spam b. Botnets

a. spam

Which is a common way to obtain a virus? a.Downloading and running an email attachment b.Installing and running purchased software

a.Downloading and running an email attachment

The _____ virus launched a DoS attack against the SCO group in 2004. a.Mydoom b. SOBIG.F

a.Mydoom

In symmetric-key cryptography, the sender and receiver use _____ keys. a.identical b.differing

a.identical. "Symmetric" means both the sender and receiver use the same key.

What is the most common purpose of a virus? a. Damage the computer or data b. Steal information or do illicit task

b. Steal information or do illicit task

How can a browser use a digital certificate to differentiate a legitimate website from one run by a malicious third party? a. The malicious third party website has a digital certificate whereas the legitimate website does not. b. The name of the malicious third party may not match the name provided on the digital certificate. c. The malicious third party has a public key instead of a digital certificate.

b. The name of the malicious third party may not match the name provided on the digital certificate.

A denial of _____ (DoS) attack sends huge numbers of access requests at a coordinated time to one website. a. spam b. service

b.service

A _________ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

botnet

After a computer is infected with a virus, the user usually realizes within how long? a.Minutes b. Days c. Possibly never

c. Possibly never

Encrypted email messages can be viewed by _____. a. anyone b. anyone with email encryption/decryption software c. a recipient with the appropriate decryption keys

c. a recipient with the appropriate decryption keys

Which website is most likely to have the real purpose of spreading viruses? a.Commercial shopping site b.Free sports article site with ads. c.Free games site

c.Free games site

______ is a program that runs on a user's computer without permission, and spreads itself to other computers, often via email.

computer virus

Cryptography involves converting that message back into a readable form

decryption

A _____________ is achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled (those requests are "denied service").

denial of service (DoS) attack

A ____________________ is achieved by submitting huge numbers of access requests simultaneously to one website, which overloads that site's web server, thus preventing legitimate requests from being handled (those requests are denied service). Infected computers are commonly used to carry out DoS attacks.

denial of service (DoS) attack

A __________________ is an electronic document that allows a person or organization to securely send and receive data over the Internet.

digital certificate

Cryptography involves converting a message into an unreadable form

encryption

Multiple firewalls should be installed on a system for better security. True/False

false

A _________ is software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network.

firewall

malicious security breach done by unauthorized access is often called

hack

A ______ is a number (or text string) used to encrypt or decrypt messages.

key

is a case of unauthorized computer access.

security breach

is an aspect of a computer that can be used to breach security. commonly exist in operating systems.

security hole or vulnerability

A firewall should be used in combination with antivirus software for better security. True/False

true


Set pelajaran terkait

Microm 301 Exam 2 Homework Questions

View Set

Med Surg I Prep U Chapter 38: Assessment and Management of Patients With Rheumatic Disorders

View Set

Excel Chapter 5 Intro To Business

View Set

Final Exam Study Guide (ECO 2013)

View Set

Mrs. Gerdes, unit 3 test 11/7/23

View Set

Classification of Business/Sectors of the Economy

View Set

Pocahontas, a Disney movie is a Native American princess, who saved the life of colonist John Smith in 1600s.

View Set