computer security unit

Ace your homework & exams now with Quizwiz!

Put the following steps of a virus infection in the correct order. Instructions

1. The virus arrives via email attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. They payload is activated and the virus starts its destructive actions.

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DoS

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

Email

Which three of the following statements are true about spyware?

Installed via free downloads or by visiting certain illegitimate websites. Includes the collection of keystrokes, passwords, and confidential information Collects information about your Internet surfing habits and behaviors.

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

e-mail virus

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse virus.

trojan

Select two true statements about fee-based (subscription-based) and free antivirus software programs.

Most fee-based software comes with technical support One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance

A Virtual _____ Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Private

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

Which one of the following statements is true when comparing fee-based antivirus software to free antivirus software?

Fee-based antivirus software often provides more features than free anti-virus software.

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.

keystroke

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.

Which three of the following are well-known e-mail attacks?

Keystroke-logging Trojan Phishing Ransomware

Which of the following three statements are true about Trojan malware?

Often used to find passwords, destroy data, or to bypass firewalls. Often found attached to free downloads and apps. Similar to viruses, but do not replicate themselves.

Which three of the following are ways to prevent computer virus infections?

Web surfing should be limited to trusted sites. Install the latest antivirus software and update frequently. Downloaded content from the web should only be from trusted sites.

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

advanced

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

Phishing Ransomware Keystroke-logging Trojan

Tricks users into revealing usernames and passwords by appearing legitimate. When activated, encrypts files on user hard drive and then sells a decryption program. When activated, saves all keystrokes for subsequent transmission to virus creator.

Adware often accompanies downloaded _____.

programs

Which two of the following can help prevent a virus infection?

Never bypass your browser's built-in security features. Adjust your web browser's security settings to allow browsing only on trusted sites.

What are the two common symptoms of a computer virus?

Programs launch on their own Documents will not save

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Server Router Computer

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

trojan

Software that infects computers and is created using computer code is called a computer _____.

virus

Firewalls Anti-virus programs Anti-malware apps

Help protect against worms and hackers: Firewall programs help protect against worms and hackers. Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats. Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed ________ of service attack.

DoS

Which two of the following statements are true regarding firewalls?

Having more than one firewall app on your computer may cause conflicts and other problems. The Mac OS includes firewall protection.

Computer viruses can infect a digital device in which three of the following ways?

Opening an infected e-mail attachment Visiting a contaminated website Downloading an infected file from the Internet

Virus symptoms Ways to catch a computer virus

The operating system does not launch properly, Critical files are deleted automatically Downloading files from questionable Internet sites, Finding a thumb drive and then using it in your laptop

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

keystrokes account numbers passwords

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

In Facebook, where would you click to download a copy of your Facebook data?

settings

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a

cyberattack

Which of the following three statements are true regarding keystroke loggers?

Can be hardware devices and software applications. Keystroke loggers can record passwords and confidential information. Software-based keystroke loggers can be installed by Trojans without the user's knowledge.


Related study sets

Marketing Chapter 4 - Consumer Behavior

View Set

5: Development and plasticity of the brain

View Set

Survey of Operating Systems (Linux)

View Set

PN Case Study Loss Grief and Death

View Set

Suspense in "The Cruel Tribute" Quiz

View Set

Uipath : Data Manipulation with Strings in Studio

View Set

Chapter 31: Drug Therapy for Nasal Congestion and Cough

View Set

Math Definitions, Axioms, and Properties

View Set

Congress Powers and the Commerce Clause and the Dormant Commerce Clause

View Set