CIS 1 Computer security
1. Ways to avoid a computer virus 2. Ways to catch a computer virus
1. Adjust your web browser's security settings to allow browsing only on trusted sites Surf the web and download content safely Purchase a new router every other year to ensure you have the latest firewall protection 2. Downloading files from the internet Opening suspicious or infected email messages Visiting questionable websites
1. Virus 2.Cyber attack
1. Trojan Horse, Worm, and Macro 2. Rootkiit, Packet Analyzer, and DOS attack
According to Microsoft, the most efficient way to block cookies is:
1.Desktop 2.Tap or click Tool button 3. Tap or click privacy
According to Microsoft, the most efficient order of steps to customize cookie settings is
1.Open desktop 2.Tap or click 3.BIG PARAGRAPH 4. When you are done
One version of this malware encrypts the victims data until a payment is made.
Ransomware
An internet filter is firewall software used to block a user's access to specific internet content. An internet filter can be installed on which of the following
Router Computer Server
This is the Windows Firewall area where you can adjust various firewall settings. Put the steps that allowed yo uto get to the screen correct order
Start button Control panel System and Security Windows Firewall
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a
Zombie
Adware often accompanies downloaded
programs
Click on icons represent popular password management apps
red * norton
Specialized hardware or software that capture packets transmitted over a network are called packer
sniffers
Select what is true about persistent cookies
Collect information about user preferences Collect formation about the IP Address Collect password and username information
A deliberate misuse of computers and networks, ______ use malicious code to modify the normal operations of a computer or network
Cyberattacks
Select what's true about fee based and free antivirus software
Most fee base software comes with technical support One with positives of free anti virus software is their malware detection performance
1.Virus symptoms 2.Ways to catch a computer virs
1.Critical files may get deleted The operating system may not launch properly If a system or networks is infected severely, it may even black out or not even launch 2.Borrowing a friends USB storage device to save a file Downloading files from the internet Visiting questionable internet sites
Desean received an unsolicited email message from an unknown sender. This email was
spam
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called
white hat hackers
Select what's true about macro viruses
Commands in the macro language set off the destructive event When file is opened the macro virus execute Initiated by downloading and opening on infected attachment
A DDos attack is when a computers that have been infected by a virus act as "zombie" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for
Distributed Denial of Service
Which of the following are ways to safely download antivirus software
Download the software from a known anti virus software vendor Download the software from a trusted site like www.cnet.com
The technology that provides a type of firewall protecting by hiding internal IP addresses is called
NAT
Which of the flowing are symptoms of an online nuisance attack?
Pop up start appearing after you visit unfamiliar sites Frequent pop ups awhile searching the web or working in programs Receiving a lot of spam message or bounced back email messages
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file if will sent the file to an isolated area on the hard disk called
Quarantine
The red arrow in the image is pointing at what component of a network designed to prevent unauthorized internet intrusions
firewall
If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in
safe mode
1. Online nuisance 2. Virus
1.Receiving a lot of spam emails and bounced back email Pop - up start appearing after visiting unfamiliar sites Frequent pop ups while searchings the web or working in programs 2.Your computer is running slower than usual You cannot boot your computer
This is the System and Security area that is accessed by clicking Control Panel System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?
Change notification settings Update your firewall settings Turn windows firewall on or off
Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of
Keystrokes Passwords Account numbers
Put the remaining steps required to set parental controls in Mac OS X in the correct order
1.Select system perferences then click parntal controls 2.Click the lock icon to unlock it 3.Select a user, then enable parental controls 4.If the user is not in the list, click Add, then fill in name
Phishing Ransomware Keystroke-logging Tojan
Tricks user into revealing usernames and passwords by appearing legitimate When activated encrypts files on user hard drive and then sells a decryption programs When activated, saves all keystrokes for subsequent transmission to virus creator
A program that appears legitimate, but executes an unwanted activity when activated is called a
Trojan horse virus
Which of the following are factors to consider to help protect the hardware of your digital device
Protecting a digital device from overheating magnetic fields humidity
Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:
Heuristic-based detection Signature-based detection
Firewall software used to block a user's access to specific internet content is called a
Internet filter
Select what is true regarding keystroke loggers
Keystroke loggers can record passwords and confidential information Can be hardware devices and software applications Software based keystroke logges are often a Torjan that is installed without the user's knowledge
Select what is true about packet sniffers
Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information
Find the incorrect statement about fee based antivirus and free antivirus software
One of the posties of free anti virus is their spam detection performance
There are a variety of techniques tha tare used to minimize the risk of harmful intrusions into a computer or network including
Packet filters Proxy
Which of the following describes phishing
Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving up private information
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called
Ransomeware
Software programs that hide the operating system and allows for the installation of hidden files are called
Rootkits
Web cookie First party cookie Third party cookie
Small test file of information created by websites you visit that your web browser stores on your hard disk Small test file of information created by a website you visit that keep track of your personal preference and the current web browsing session Small test file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processor
Spectre Meltdown
Often accompanying download music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a
Trojan
Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars
True
Spam messages are sometimes called _ and are used for a variety of marketing purposes including selling products and services
UBE
What are symptoms that your system has been hacked
Unwanted browser toolbars Redirected internet searches Fake emails or social media messages from your account
A destructive program that replicates itself throughout a single computer or across a network is called a
Worm
Common types of malware include
Worm Tojans Viruses
developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network _ Translation provides a type of firewall protection by hiding internal IP addresses
address
Small test files created websites you visit that your web browser stores on your hard disk is called
cookies
A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called
cyber crime
A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a
cyberbully
it is important to think before click when _ software from the web
downloading
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called
hacker
A form of spyware that records all actions typed on a keyboard is called a
keystroke logger
Experts suggest using password _ software to keep your passwords safe
management software
A secret code used to help prevent unauthorized access to data and user accounts is called a
password
A type of phishing that seeks to obtian information through malicious software that is inserted on victims' computers and directs them to fake webpage is called
pharming
The illegitimate use of an email message that is sent to collect personal information and appears to be from an establish organization such as a bank company is called
phishing
A worm that is a type of malware that _ itself throughout a single computer or across a network
replicates
What type of cookie is stored in temporary memory and is lost when the web browser is closed
session
The software code of a particular computer virus is called the virus
signature
Unsolicited email is
spam
Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a
spam filter
Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device
virus
Firewalls Anit virus programs Anit malwarre apps
Help protect against worms and hackers Help protect against viruses Help protect against malware
Which of the following are online nuisance
Spyare Spam Spoofing
Typically computer viruses must be _ to attack and do damage to digital device
run
1. Hacker 2. Online nuisances
1. White hat Black hat Cyber terrorist Script Kiddie 2.Spam Spyware Adware
On a mac home screen, where do you click to access to adjust parental control settings?
Apple Settings
Put the steps to change safari cookie
Choose safari Click Preferences Click privacy Change cookie settings
After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data
Click - Remove All Website Data
You need to adjust cookie and data permission settings in google Chrome. Put the steps for adjusting cookie and site data permission settings in Goggle Chrome in the correct order.
Click the Chrome menu Click show advanced settings In the "cookie"
You can change your Firefox setting to allow you to
Delete cookie Approve cookie Deny cookie
There are a variety of cookie settings that can adjusted in Google Chrome including
Deleting cookies Blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains
In the settings area of each browser you should consider
Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a
Dos
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called
Dos attack
According to US-CERT if you receive a phishing message you should contact them using which of the following method
In Outlook Contact the via the phone number
This is the privacy tab in internet Explorer. IS the slider in the image set to the right level to allow all cookies?
No, to save all cookies you need to move the slider all the way to the bottom
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as
Pharming
Which of the following are widely used tactics that can help keep you safe on the Web
Use your browser's private browsing mode Consider using a VPN Make sure the sites you visit use HTTPS
Juan attempts to gain unauthorized access to networks. Juan would be considered a
hacker
What type of server intercepts all messages between client and a server to help avert a hacker or other intruder from attacking a network
proxy
Which area of the control panel screen in windows 7 allows you to adjust parental control
3 user accounts
A group of compromised computers controlled by a hacker is called a
Botnet
Put the steps to have Firefox block cookies from one website in the correct order
Go to the website you wish to block from setting cookies in Firefox Right-click In the page Underneath
Hacking computer systems for a politically or socially motivated purposes is called
Hacktivist
Select what's true about Trojan malware
Often uses to find passwords, destroy data, or to bypass firewalls Similar to viruses, but do not replicate themselves Often found attached to free downloads and apps
Safari accepts cookies and websites data from which of the following
Only from websites you visit
This is the options tab in Firefox. where would you click to adjust cookie settings
Privacy
Click on the organization below that you should contest if you receive a phishing message
US-CERT
A _ hat hacker breaks into computer system with the intent of causing damage or stealing data
black
Specialized hardware of software that capture packets transmitted over a network called packet
sniffers
One risks with cookies is
websites using cookies can collect your information and sell it to third parties
1. Online nuiscance 2.Virus
1. Frequent pop-ups while searching the web Receiving a lot of spam emails and bounced back email Pop-ups start appearing after visiting unfamiliar sites 2. You cannot boot your computer Your computer is running slower than usual
1. Online nuisance 2. Other computer terms
1. Trolling Phishing Spoofing Spyware 2.Hardware Theft Software theft First Party cookies
This is a Mozilla Firefox screen. Where on the screen would you click to delete cookies
4 line one
Where in the image above would you click to download a copy of your facebook data
4 triangle
Identify what is true about script kiddies
Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that other have written