CIS 1 Computer security

Ace your homework & exams now with Quizwiz!

1. Ways to avoid a computer virus 2. Ways to catch a computer virus

1. Adjust your web browser's security settings to allow browsing only on trusted sites Surf the web and download content safely Purchase a new router every other year to ensure you have the latest firewall protection 2. Downloading files from the internet Opening suspicious or infected email messages Visiting questionable websites

1. Virus 2.Cyber attack

1. Trojan Horse, Worm, and Macro 2. Rootkiit, Packet Analyzer, and DOS attack

According to Microsoft, the most efficient way to block cookies is:

1.Desktop 2.Tap or click Tool button 3. Tap or click privacy

According to Microsoft, the most efficient order of steps to customize cookie settings is

1.Open desktop 2.Tap or click 3.BIG PARAGRAPH 4. When you are done

One version of this malware encrypts the victims data until a payment is made.

Ransomware

An internet filter is firewall software used to block a user's access to specific internet content. An internet filter can be installed on which of the following

Router Computer Server

This is the Windows Firewall area where you can adjust various firewall settings. Put the steps that allowed yo uto get to the screen correct order

Start button Control panel System and Security Windows Firewall

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a

Zombie

Adware often accompanies downloaded

programs

Click on icons represent popular password management apps

red * norton

Specialized hardware or software that capture packets transmitted over a network are called packer

sniffers

Select what is true about persistent cookies

Collect information about user preferences Collect formation about the IP Address Collect password and username information

A deliberate misuse of computers and networks, ______ use malicious code to modify the normal operations of a computer or network

Cyberattacks

Select what's true about fee based and free antivirus software

Most fee base software comes with technical support One with positives of free anti virus software is their malware detection performance

1.Virus symptoms 2.Ways to catch a computer virs

1.Critical files may get deleted The operating system may not launch properly If a system or networks is infected severely, it may even black out or not even launch 2.Borrowing a friends USB storage device to save a file Downloading files from the internet Visiting questionable internet sites

Desean received an unsolicited email message from an unknown sender. This email was

spam

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

Select what's true about macro viruses

Commands in the macro language set off the destructive event When file is opened the macro virus execute Initiated by downloading and opening on infected attachment

A DDos attack is when a computers that have been infected by a virus act as "zombie" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for

Distributed Denial of Service

Which of the following are ways to safely download antivirus software

Download the software from a known anti virus software vendor Download the software from a trusted site like www.cnet.com

The technology that provides a type of firewall protecting by hiding internal IP addresses is called

NAT

Which of the flowing are symptoms of an online nuisance attack?

Pop up start appearing after you visit unfamiliar sites Frequent pop ups awhile searching the web or working in programs Receiving a lot of spam message or bounced back email messages

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file if will sent the file to an isolated area on the hard disk called

Quarantine

The red arrow in the image is pointing at what component of a network designed to prevent unauthorized internet intrusions

firewall

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in

safe mode

1. Online nuisance 2. Virus

1.Receiving a lot of spam emails and bounced back email Pop - up start appearing after visiting unfamiliar sites Frequent pop ups while searchings the web or working in programs 2.Your computer is running slower than usual You cannot boot your computer

This is the System and Security area that is accessed by clicking Control Panel System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?

Change notification settings Update your firewall settings Turn windows firewall on or off

Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of

Keystrokes Passwords Account numbers

Put the remaining steps required to set parental controls in Mac OS X in the correct order

1.Select system perferences then click parntal controls 2.Click the lock icon to unlock it 3.Select a user, then enable parental controls 4.If the user is not in the list, click Add, then fill in name

Phishing Ransomware Keystroke-logging Tojan

Tricks user into revealing usernames and passwords by appearing legitimate When activated encrypts files on user hard drive and then sells a decryption programs When activated, saves all keystrokes for subsequent transmission to virus creator

A program that appears legitimate, but executes an unwanted activity when activated is called a

Trojan horse virus

Which of the following are factors to consider to help protect the hardware of your digital device

Protecting a digital device from overheating magnetic fields humidity

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

Heuristic-based detection Signature-based detection

Firewall software used to block a user's access to specific internet content is called a

Internet filter

Select what is true regarding keystroke loggers

Keystroke loggers can record passwords and confidential information Can be hardware devices and software applications Software based keystroke logges are often a Torjan that is installed without the user's knowledge

Select what is true about packet sniffers

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

Find the incorrect statement about fee based antivirus and free antivirus software

One of the posties of free anti virus is their spam detection performance

There are a variety of techniques tha tare used to minimize the risk of harmful intrusions into a computer or network including

Packet filters Proxy

Which of the following describes phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving up private information

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called

Ransomeware

Software programs that hide the operating system and allows for the installation of hidden files are called

Rootkits

Web cookie First party cookie Third party cookie

Small test file of information created by websites you visit that your web browser stores on your hard disk Small test file of information created by a website you visit that keep track of your personal preference and the current web browsing session Small test file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processor

Spectre Meltdown

Often accompanying download music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a

Trojan

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars

True

Spam messages are sometimes called _ and are used for a variety of marketing purposes including selling products and services

UBE

What are symptoms that your system has been hacked

Unwanted browser toolbars Redirected internet searches Fake emails or social media messages from your account

A destructive program that replicates itself throughout a single computer or across a network is called a

Worm

Common types of malware include

Worm Tojans Viruses

developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network _ Translation provides a type of firewall protection by hiding internal IP addresses

address

Small test files created websites you visit that your web browser stores on your hard disk is called

cookies

A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called

cyber crime

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a

cyberbully

it is important to think before click when _ software from the web

downloading

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called

hacker

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

Experts suggest using password _ software to keep your passwords safe

management software

A secret code used to help prevent unauthorized access to data and user accounts is called a

password

A type of phishing that seeks to obtian information through malicious software that is inserted on victims' computers and directs them to fake webpage is called

pharming

The illegitimate use of an email message that is sent to collect personal information and appears to be from an establish organization such as a bank company is called

phishing

A worm that is a type of malware that _ itself throughout a single computer or across a network

replicates

What type of cookie is stored in temporary memory and is lost when the web browser is closed

session

The software code of a particular computer virus is called the virus

signature

Unsolicited email is

spam

Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a

spam filter

Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device

virus

Firewalls Anit virus programs Anit malwarre apps

Help protect against worms and hackers Help protect against viruses Help protect against malware

Which of the following are online nuisance

Spyare Spam Spoofing

Typically computer viruses must be _ to attack and do damage to digital device

run

1. Hacker 2. Online nuisances

1. White hat Black hat Cyber terrorist Script Kiddie 2.Spam Spyware Adware

On a mac home screen, where do you click to access to adjust parental control settings?

Apple Settings

Put the steps to change safari cookie

Choose safari Click Preferences Click privacy Change cookie settings

After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data

Click - Remove All Website Data

You need to adjust cookie and data permission settings in google Chrome. Put the steps for adjusting cookie and site data permission settings in Goggle Chrome in the correct order.

Click the Chrome menu Click show advanced settings In the "cookie"

You can change your Firefox setting to allow you to

Delete cookie Approve cookie Deny cookie

There are a variety of cookie settings that can adjusted in Google Chrome including

Deleting cookies Blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains

In the settings area of each browser you should consider

Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a

Dos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called

Dos attack

According to US-CERT if you receive a phishing message you should contact them using which of the following method

In Outlook Contact the via the phone number

This is the privacy tab in internet Explorer. IS the slider in the image set to the right level to allow all cookies?

No, to save all cookies you need to move the slider all the way to the bottom

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

Pharming

Which of the following are widely used tactics that can help keep you safe on the Web

Use your browser's private browsing mode Consider using a VPN Make sure the sites you visit use HTTPS

Juan attempts to gain unauthorized access to networks. Juan would be considered a

hacker

What type of server intercepts all messages between client and a server to help avert a hacker or other intruder from attacking a network

proxy

Which area of the control panel screen in windows 7 allows you to adjust parental control

3 user accounts

A group of compromised computers controlled by a hacker is called a

Botnet

Put the steps to have Firefox block cookies from one website in the correct order

Go to the website you wish to block from setting cookies in Firefox Right-click In the page Underneath

Hacking computer systems for a politically or socially motivated purposes is called

Hacktivist

Select what's true about Trojan malware

Often uses to find passwords, destroy data, or to bypass firewalls Similar to viruses, but do not replicate themselves Often found attached to free downloads and apps

Safari accepts cookies and websites data from which of the following

Only from websites you visit

This is the options tab in Firefox. where would you click to adjust cookie settings

Privacy

Click on the organization below that you should contest if you receive a phishing message

US-CERT

A _ hat hacker breaks into computer system with the intent of causing damage or stealing data

black

Specialized hardware of software that capture packets transmitted over a network called packet

sniffers

One risks with cookies is

websites using cookies can collect your information and sell it to third parties

1. Online nuiscance 2.Virus

1. Frequent pop-ups while searching the web Receiving a lot of spam emails and bounced back email Pop-ups start appearing after visiting unfamiliar sites 2. You cannot boot your computer Your computer is running slower than usual

1. Online nuisance 2. Other computer terms

1. Trolling Phishing Spoofing Spyware 2.Hardware Theft Software theft First Party cookies

This is a Mozilla Firefox screen. Where on the screen would you click to delete cookies

4 line one

Where in the image above would you click to download a copy of your facebook data

4 triangle

Identify what is true about script kiddies

Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that other have written


Related study sets

Part 7 - Joules, Calories, Kilocalories

View Set

Speaking and Listening: Effective Group Discussions Quiz

View Set

Exam 1; comfort, mobility, sleep

View Set

PrepU Trans Assignment 10 Communication

View Set

A&P I Exam 2 - Bone 3 (Bone Formation)

View Set

Brunner Suddarth Chapter 06 Transcultural Nursing

View Set

Women's Health - Chapter 6 - Prep U

View Set

BUS205 CH. 3 Human Resource Management Strategy & Analysis

View Set

Law Quiz 1- Food Drug and Cosmetic Act

View Set