computer security

Ace your homework & exams now with Quizwiz!

a virus written in a macro language and placed within a document or spreadsheet is called a

macro virus

experts suggest using password ___ software to keep your passwords safe

management

stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as ___ cookies

persistent

keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

according to US-CERT if you receive a phishing message you should contact them using which of the following methods?

contact them either via email or phone

this is the options tab in Mozilla Firefox. where would you click to adjust cookie settings

privacy

a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___

cyberattack

what type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network

proxy

adware often accompanies downloaded

programs

this is the system and security area that is accessed by clicking control panel>system and security. when you click windows firewall, what are some of the firewall settings you can adjust?

- turn windows firewall on or off - update your firewall settings - changes notification settings

A detractive program that replicates itself throughout a single computer or across a network is called a

worm

*only have on firewall*

*could lead to issues if you have more than one*

computers infected with a virus exhibit many symptoms including

- OS does not launch properly - files get deleted or encrypted - strange error messages or pop-up ads

virus

- Trojan horse - worm - macro

on-foing series of events cybercrimes

- blackmail - cyberstalking

the privacy risks associated with cookies

- corporate and government entities can track your web behavior - websites can track your surfing behavior and create a profile - websites using cookies can collect your information and sell it to a third parties

you can change your Firefox settings to allow you to

- deny cookie storage requests - delete stored cookies automatically when you start firefox 0 approve cookies storage requests

the functions of session cookies

- determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used

which of the following are ways to safely download antivirus software

- download the software from a trusted sit like www.cnet.com - download the software form a known anti-virus software vendor

cyberattacks include

- identity theft - pharming - DDOS attacks

what is true about packet sniffers

- legitimate sniffers are used for routine examination and problem detections - unauthorized sniffers are used to steal information

the correct statements about fee based antivirus and free anti-virus software

- most of the free anti-virus programs perform almost as effectively as their fee-based counterparts - one of the main differences between free and anti-virus software is the number of features ------------ incorrect!!! one of the positives of free anti-virus software is their spam detection performance

on the privacy tab in internet explorer you can adjust which settings?

- override your privacy settings for certain types of cookies - block or allow specific websites - what types of cookies are blocked or allowed

which of the following re factors to consider to help protect them hardware of your digital device

- protecting a digital device from humidity - protecting a digital device from magnetic fields - protecting a digital device from overheating

which of the following are common email viruses?

- ransomware - phishing - keystroke-logging trojan

cyberattacks

- rootkit - packet analyzer - DOS attack

antivirus programs use a variety of techniques to identify and remove viruses and malware. two of the most common techniques are

- signature-based detection - heuristic-based detection

which of the following are online nuisances?

- spam - spoofing - spyware

what is true about passwords

- the term passwords and key are synonymous for passwords - passwords can be used to secure computers, networks, software, personal accounts, and digital devices

put the steps for adjusting cookie settings in proper order

1. choose safari 2. click preferences 3. click privacy 4. change cookie settings

according to Mozilla, one of the most efficient ways to clear cookies in Firefox is

1. click the menu button, choose history, and then clear recent history 2. once you have to cleared recent history you should set the time range to clear everything 3. click on the arrow next to details to expand list of history items 4. select cookies and make sure that other items you want to keep are not selected. close the clear recent history window 5. clear clear now to clear cookies

according to Microsoft, what is the correct order of steps to accept all cookies in internet explorer?

1. open internet explorer 2. click the tools icon 3. click internet options 4. click the privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply

most efficient way to block cookies is

1. open the desktop, and then tap or click the internet explorer icon on the task bar 2. tap or click the tools bar, and then tap or click internet options 3. tap or click the privacy tab, and under settings, move the slider to the top to block all cookies, and then tap or click OK

put the remaining steps required to set parental controls in Mac OS X in the correct order

1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. in the user is not in the list, click add, then fill in the name, account, and password information to create a new user

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ___ attack

DoS

the technology that provides a type of firewall protection by hiding internal IP address is called

NAT (network address translation)

a program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus

Trojan

spam messages are sometimes called ___ and are used for a variety of marketing purposes including selling products and services

UBE

developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses

address

on a Macintosh home screen, where do you click to access to adjust parental control settings?

apple and settings

A group of compromised computers controlled by a hacker is called a

botnet

after you have clicked on the privacy tab in safari, which of the following are way to efficiently remove cookies and stored data?

click- remove all website data, or click details then select one or more websites, then click remove

spyware is

considered an online nuisance

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym DDoS stands for

distributed denial of service

trojan malware

doesn't replicate themselves

a virus is attached in a file in and sent via email message is called a ___ virus

email

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a

firewall

which tab would you click to delete cookies?

general

a category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purpose is

hacktivism

overheating, humidity, and magnetic fields can cause damage to the ___ of a digital device

hardware

black hat hackers

intent to be mean sad face

firewall software used to block a user's access to specific internet content is called a ___ filter

internet

a form of spyware that records all actions typed on a keyboard is called a ___ logger

keystroke

a virus written a specific language and placed within a document or spreadsheet is called a ___ virus

macro

safari accepts cookies and website data from which of the following?

only from websites you visit

computers viruses typically must be ___ to attack and do damage. viruses can destroy programs or alter the operation of a computer or network

opened

which area of the control panel screen in windows 7 allows you to adjust parental control?

other users

where would you click in the view page info screen in Mozilla Firefox page that allows you to access the area that allows you to block cookies

permissions

creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

pharming

illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a blank, or insurance company is called

phishing

below is an image of the internet options tab in internet explorer. which tab should you click to block cookies in internet explorer?

privacy

in 2017, wanna cry infected nearly 250,000 computers in one day. in malware encrypted victims data files and demanded payment for decryption code. this type of malware is called

ransomware

a worm is a type of malware that ___ itself throughout a single computer or across a network

replicates

worms

reproduce type o thing

a type of malware that is triggered each time you boot your computer is called a

rookit

specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

DeSean received an unsolicited email message from an unknown sender. this email was

spam

ted installs computers software designed to prevent spam messages from entering his email inbox. this type of software is called a ___ filter

spam

unsolicited email is

spam

software that collects information about your internet surfing habits and behaviors is called

spyware

phishing

tricks users into revealing usernames and passwords by appearing legitimate

ransomeware

when activated, encrypts files on user hard drive and then sells a decryption program

spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies

word

a type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

once the virus is identified the antivirus software attempts to remove the virus from the file. if the software cannot remove the infected file it will send the file to an isolated area on the hard disk called

quarantine

if you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___ mode

safe

stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page

session

what type of cookie is stored in temporary memory and is lost when the web is closed?

session

this is the settings area of google chrome. where would you click to adjust cookie and site data permissions?

show advanced settings

the software code of a particular computer virus is called the virus

signature

first party cookie

small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

web cookies

small text file of information created by websites you visit that your web browser stores on your hard drive

third party cookie

small text file of information. created by a website other than the one you currently visiting and are used to track your surfing habits and are considered an invasion of privacy

single event cybercrimes

- phishing - Trojan horse - keystroke logger

which of the following are symptoms of an online nuisance attack?

- pop up start appearing after you visit unfamiliar sites - receiving a lot of spam messages or bounced back email messages - frequent pop-ups while searching the web or working in programs

what is true regarding keystroke loggers

- keystroke loggers can record passwords and confidential information - can be hardware devices and software applications - software based keystroke loggers are often a trojan that is installed without the user's knowledge

typical firewall programs or hardware devices filter all information coming through the internet to your network or computer system. there are a variety of techniques that are used to minimize the risk of harmful infusion into a computer or network including

- packet filters - proxy servers

identify what is true about script kiddies

- amateur computer hackers with the little programming expertise - illegally gain access to computer systems using programs (script) that others have written

what are the symptoms that your system has been hacked?

- unwanted browser toolbars - redirected internet searches - fake emails or social media messages from your account


Related study sets

Google Search Ads Certification Study Guide 2023

View Set

Physics 1310 Echon Test 2 Review

View Set

Chapter 10 Hmwk and Quiz questions

View Set

Psychiatric-Mental Health Practice Exam HESI

View Set

What three structures make up the bacterial cytoskeleton and what are they used for? Which are used in eukaryotic flagella? Which are used in pseudopodia motility?

View Set