Adaptive Learning Assignment: Chapter 1 - Computer Security

Ace your homework & exams now with Quizwiz!

Virus symptoms

- The operating system does not launch properly - Critical files are deleted automatically

Which three of the following are ways to prevent computer virus infections?

- Web surfing should be limited to trusted sites. - Install the latest antivirus software and update frequently. - Downloaded content from the web should only be from trusted sites.

In Firefox, cookies can store a wide range if information including which of the following?

-Email address -Home address -Name

Which two of the following can help prevent a virus infection?

- Adjust your web browser's security settings to allow browsing only on trusted sites. - Never bypass your browser's built-in security features.

Ways to catch a computer virus

- Finding a thumb drive and then using it in your laptop - Downloading files from questionable Internet sites

Anti-virus programs

Help protect against viruses: These programs help to protect your system from a variety of virus threats.

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

Which two of the following statements are true regarding firewalls?

The Mac OS includes firewall protection.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed _____________ of service attack.

denial

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ________.

email virus

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

A form of spyware/surveillance technology that records all typed actions is referred to as a ________.

keystroke logger

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called

ransomeware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomeware

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

ransomware phishing keystroke logging Trojan

Often, to actually launch an attack on a computer, a virus must be opened and ___

run

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

A program that appears legitimate but executes an unwanted activity when activated is commonly called a _______.

trojan

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Anti-malware apps

Help protect against malware: These apps help protect against a variety of malicious programs.

Firewalls

Help protect against worms and hackers: Firewall programs help protect against worms and hackers.

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____

hacker

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

A form of spyware that records all actions typed on a keyboard is called a _________ logger.

keystroke or key

Malware is short for _________ software.

malicious

Typically computer viruses must be _____ to attack and do damage to a digital device.

open and run

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

trojan horse

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ______.

zombie

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _________. An army of these are used to launch denial of service (DoS) attacks.

zombie

Which three of the following are well-known e-mail attacks?

- Phishing - Keystroke-logging Trojan - Ransomware

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

- inserting and opening an infected thumb drive - opening an infected e-mail attachment - sharing an infected file

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

-Router -Server -Computer

Malware may be designed to do which three of the following?

-steal info - incapacitate a computer/network - destroy data

A program that appears legitimate, but executes an unwanted activity when activated is called a __________ horse virus.

trojan

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email

Which of the following three statements are true regarding keystroke loggers?

- Can be hardware devices and software applications - Keystroke loggers can record passwords and confidential information - Software-based keystroke loggers can be installed by Trojans without the user's knowledge.

Which of the following three statements are true about Trojan malware?

- Often used to find passwords, destroy data, or to bypass firewalls. - Often found attached to free downloads and apps. - Similar to viruses, but do not replicate themselves.

Which three of the following statements are true about spyware?

- Installed via free downloads or by visiting certain illegitimate websites - Includes the collection of keystrokes, passwords, and confidential information - Collects information about your Internet surfing habits and behaviors.

Computer viruses can infect a digital device in which three of the following ways?

- Opening an infected e-mail attachment - Visiting a contaminated website - Downloading an infected file from the Internet

Which two of the following statements are true regarding firewalls?

- The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.

This is a Mozilla Firefox screen. Where on the screen would you click to manage cookie settings?

Button 4

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Software that illicitly collects information about your Internet surfing habits and behaviors is called __

Spyware

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.

adware

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

keystrokes account numbers passwords

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

You can change your Firefox settings to allow you to do which three of the following?

- deny cookie storage requests - delete stored cookies automatically when you start Firefox - approve cookies storage requests.

Which of the following three are common types of malware?

- Viruses - Trojans - Worms

Software that infects computers and is created using computer code is called a computer _____.

virus


Related study sets

Quickbooks - Online Practice Tests (1 & 2)

View Set

Mental Health Chapter 18 Practice Questions

View Set

Lecture 7- Freedman- Inflammation

View Set

Defining Research with Human Subjects - SBE CITI

View Set

The Chemical Basis of Life: Organic Molecules Associated in Life

View Set