Chapter 7 Adaptive Learning Assignment: Computer Security

Ace your homework & exams now with Quizwiz!

Which three of the following statements are true about spyware?

1. Installed via free downloads or by visiting certain illegitimate websites. 2.Includes the collection of keystrokes, passwords, and confidential information 3.Collects information about your Internet surfing habits and behaviors.

Which three of the following are factors to consider to help protect the hardware of your digital device?

1. Protecting a digital device from humidity 2.Protecting a digital device from overheating 3.Protecting a digital device from magnetic fields

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

1. ransomware 2.keystroke logging Trojan 3.phishing

According to the CIA triad, in which of the following examples is an organization ensuring data integrity

1.Access to important data is limited so that only certain employees are able to modify that data. 2.During an acquisition, logistics data are securely transferred to the acquiring company's servers.

Which of the following three are common types of malware?

1.Worms 2.Trojans 3.Viruses

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.

Distributed Denial of Service

Ransomware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code

Black Hat Hacker

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Firewall

Which component of a network designed to prevent unauthorized Internet intrusions?

a. Firewalls b. Anti-virus Programs c. Anti-malware Programs

a. Help protect against worms and hackers: Firewall programs help protect against worms and hackers. b. Help protect against viruses: These programs help to protect your system from a variety of virus threats. c. Help protect against malware: These apps help protect against a variety of malicious programs.

A group of compromised computers controlled by a hacker is called a _____.

botnet

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

private

Adware often accompanies downloaded _____.

programs

Most e-mail applications, such as Gmail and Outlook, provide robust_____ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

1.Corporate and government entities can track your web behavior. 2.Websites using cookies can collect your information and sell it to third parties. 3.Websites can track your surfing behavior and create a profile.

three privacy risks associated with cookies.

A program that appears legitimate, but executes an unwanted activity when activated is called a____ horse virus

trojan

A destructive program that replicates itself throughout a single computer or across a network is called a

worm

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality?

1. Access Control 2. Authentication

Which 2 of the following statements are true about passwords?

1. Check your accounts. Regularly check your accounts to ensure they have not been tampered with. 2. Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be.

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

1.Router 2.Server 3.Computer

Which of the following are online nuisances

1.Spoofing 2.Spam 3.Spyware

Which three of the following are ways to prevent computer virus infections?

1.Web surfing should be limited to trusted sites. 1.Downloaded content from the web should only be from trusted sites. 3.Install the latest antivirus software and update frequently.

Select 3 ways in which computer virus commonly infect vulnerable digital devices.

1.opening an infected e-mail attachment 2.sharing an infected file 3.inserting and opening an infected thumb drive

cybercrime

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cyberattack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network

hacker

A person who gains unauthorized access to networks in order to steal and corrupt information and data

Rootkit

A type of malware that is triggered each time you boot your computer

Password

A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____

Macro Virus

A virus written in a specific language and placed within a document or spreadsheet is called a

Spam Filter

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

E-mail virus

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

websites using cookies can collect your information and sell it to third parties

One of the risks with cookies is ___.

cookies

Small text files created by websites you visit that your web browser stores on your hard disk are called

Sniffers

Specialized hardware or software that capture packets transmitted over a network are called pack

NAT (Network Address Translation)

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

Availability

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to an

email

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

A typical ___ manager (such as Dashlane or LastPass) is installed as a browser plug in and provides for extremely secure logins.

password

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a

zombie

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality?

1.Authentication 2.Access Control 3.Encryption

Malware may be designed to do which three of the following?

1.Destroy data 2.Steal information 3.Incapacitate a computer or network

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a

Which of the following is an example of a tool that could be used to ensure data integrity

1.Data correction codes are used to ensure the data retrieved are the same as when it was stored. 2.Data are regularly backed up.

Which three of the following you should consider in the settings area of each browser?

1.Deleting cookies 2.Blocking or customizing your cookie settings 3.Decide from which sites you want to allow cookies

Which of the following may be indications that your system has been hacked?

1.Fake e-mails or social media messages in your account 2.Unwanted browser toolbars 3.Frequent random pop-ups 4.The computer turns on or off by itself

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

1.Passwords 2.Keystrokes 3.Account Numbers


Related study sets

CH#4: Life Insurance Policy Provisions, Options and Riders Q&A

View Set

Biology Chapter 10: Meiosis and Sexual Life Cycles

View Set

Module 15 Practice Quiz on Modules 44, 45 and 46

View Set