Computer Security
Choose what is true about cookie privacy risks. -Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior. -Hackers can use cookies to launch attacks on your computers.
- -Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.
If you believe you have fallen victim to a phishing scam, which two should you do right away? - Contact the institution the message was allegedly sent from. -Contact US-CERT. -Contact your ISP. -Contact the person or organization who sent the message.
- Contact the institution the message was allegedly sent from. -Contact US-CERT.
Cyberattacks include ________ and ________. - DDoS attacks - email spam - identity theft - hardware theft
- DDoS attacks - identity theft
What is true about packet sniffers? - Legitimate sniffers are used for routine examination and problem detection. -.Unauthorized sniffers are used to steal information. - Packet sniffers are relatively easy to detect - Packet sniffers use viruses to capture data packets.
- Legitimate sniffers are used for routine examination and problem detection. -.Unauthorized sniffers are used to steal information.
Identify what is true about script kiddies. - are amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written - have the skill or experience to write their own programs - are usually females between the ages of 30 and 50 Correct
- are amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written
Which of the following are treated as cybercrimes? - data manipulation - data corruption - cyberbullying - pop-up advertising
- data manipulation - data corruption - cyberbullying
What is true of the malware Trojan horse? - found attached to free downloads and apps - often used to find passwords, destroy data, or to bypass firewalls -similar to adware - Trojan malware is the same as a macro virus.
- found attached to free downloads and apps - often used to find passwords, destroy data, or to bypass firewalls
An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following? - router or computer - network - keyboard tracker - stand-alone filter attached to a server
- router or computer - network - stand-alone filter attached to a server
Which of the following are online annoyances? - spam - spyware - spoofing - snail mail
- spam - spyware - spoofing
Cyberattacks include the following - spyware - pharming and phishing. - spamming and spoofing. - DoS and DDoS attacks.
- spyware - pharming and phishing. - spamming and spoofing. - DoS and DDoS attacks.
Websites that use cookies can collect information about - surfing habits - selling your collected information to third parties. - monitoring your web behavior - tracking a user's cloud storage.
- surfing habits - selling your collected information to third parties. - monitoring your web behavior
You can minimize your risk of computer damage by using a ________ or a ________. - surge protector - UPS (Uninterruptible Power Supply) - keyboard protector - mouse pad
- surge protector - UPS (Uninterruptible Power Supply) - mouse pad
zombie
- zomputer that has been taken over by a hacker, typically by using a rootkit -used to launch denial of service (DoS) attacks
Rootkits enable a remote user to do which of the following? -Install drivers. -Install rogue files. - Create backdoor programs. -Delete files.
-Install rogue files. - Create backdoor programs. -Delete files.
cyber attack
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network
internet filter
Firewall software used to block a user's access to specific Internet content
anti malware apps
Help protect against malware
anti virus programs
Help protect against viruses
firewalls
Help protect against worms and hackers - The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.
ransomware
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code
trojan
Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated
what are the two common symptoms of a computer virus? Your speakers do not work. Programs launch on their own Documents will not save Your computer will not power on
Programs launch on their own Documents will not save
An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Router Computer Server
adware
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements
spyware
Software that illicitly collects information about your Internet surfing habits and behaviors - keystrokes, account numbers, passwords
virus
Software that infects computers and is created using computer code
sniffer
Specialized hardware or software that capture packets transmitted over a network
Phishing/spoofing
Tricks users into revealing usernames and passwords by appearing legitimate (websites
Sometimes spam messages are referred to as ________. Multiple ChoiceUBEUSBUBMUBB
UBE
denial of service attack
attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests
Keystroke Logger
cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware
worm
damaging program duplicating itself on a single computer or over a network
Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) _______________
vpn
hides your IP address to outside websites by running your communications through a secure network.