CSC 115 MIDTERM CHAPTER 7
Which mobile operating system is a popular target for malware because it is an open-source OS
Android
True or false: Only the Apple App store and iTunes offer free mobile security apps.
False
True or false: Phishing is growing on social networking sites because criminals have easy access to the networks.
False
True or false: You should disable all cookies because they are attempts by websites to track your activities.
False
Which of the following is not one of the criteria of a strong password?
If should only contain dictionary words if they are spelled backward.
In some Facebook clickjacking events, the _____ button was a fake replica that redirected users to advertising that paid the criminal each time the scam worked.
Like
_____ is similar to phishing except that the individual is tricked into typing in personal information at a fake website that the user is redirected to when the real website address has been compromised by criminals.
Pharming
What type of infection occurs because a program disguises itself as beneficial software to the user?
Trojan horse
True or false: Data from IoT devices is at risk of interception by a hacker when the data is transmitted to a cloud storage website or to a smartphone.
True
Which of the following actions is not a typical method used by a cybercriminal to gain control of your computer without your knowledge?
You install a new hardware device that is infected with a virus.
Software that causes pop-up ads to appear on your PC while viewing a web page is called
adware
Which of the following is not a strategy to prevent unauthorized access to a network?
allow employees to use company-owned equipment for personal activities only during lunch breaks
Chapter 7 discusses several physical characteristics that can be used by a biometric device to authenticate a user. Which of the following is not one of them?
an ear scan
A collection of computers controlled by a cybercriminal and used to conduct an attack on another network is called a
botnet
In a _____ technique, a button, graphic, or link on a web page appears to be real but, when clicked, causes malicious software to run.
clickjacking
What is someone engaged in Wi-Fi piggybacking doing?
connecting to someone's wireless network without the network owner's consent
The illegal activities involving computers on the internet are collectively known as
cybercrime
What type of attack does this illustration depict?
denial of service
A macro virus is a virus that is
embedded in a document
White hats and black hats are types of
hackers
You can prevent your computer from becoming a zombie by using up-to-date antivirus software, updating the OS regularly, and
having a firewall active at all times
When shopping online, look for _____ in front of the URL to be sure the site is transmitting data using Transport Layer Security encryption.
https
When your personal information is stolen by a criminal who uses the data for financial gain while posing as you, you are the victim of
identity theft
What do firewalls monitor?
incoming and outgoing network traffic
Which term describes the right of individuals to exercise control over personal information that is collected about them?
information privacy
This type of spyware is sometimes promoted to parents as a way to monitor their children's online activities.
keyloggers
The general term for software that is designed to damage, disable, or steal data is
malware
A user receives a message that appears to be from a retailer she is familiar with. The message directs the user to click a link and enter her account information, which is then used fraudulently. This is known as
phishing
Your computer has been infected with _____ if a criminal has locked or otherwise restricted access to it and demanded that you pay for an unlock code.
ransomware
Users of a cloud storage service to store photos and documents control data privacy by
restricting who can see a file
Which type of malware is hard to detect because the software disguises itself as an essential operating system file?
rootkit
Phishing and pharming scams use _____ techniques, where a sender's email or IP address is altered to appear to be a trusted source.
spoofing
This type of software tracks your online activity without your knowledge.
spyware
A cookie is a small _____ placed on your computer by a web server.
text file
Which of the following is not a reason a hacker might launch a DoS attack?
to steal personal information
What should you do to secure your device from a Bluetooth intrusion when you are in a crowded public place?
turn Bluetooth on only when you need it; turn it off as soon as you are done with it
Which of the following is not an action that will provide security for your smartphone data in the event the device is stolen?
turning off the tethering feature
Jane opened an attachment in an email that she did not realize contained malware. The malware then spread automatically to other computers on the same network. The attachment contained a _____, which is a form of malware that replicates itself.
virus
Susan connected her laptop to a network that she did not realize was infected with malware. Later she discovered that her laptop had become infected with the same malware. Which type of infection is a self-replicating program that copies itself to any other computer connected to the same network?
worm
An internet-connected computer that is controlled by a cybercriminal without the owner's knowledge is called a _____ computer.
zombie