CSC 115 MIDTERM CHAPTER 7

Ace your homework & exams now with Quizwiz!

Which mobile operating system is a popular target for malware because it is an open-source OS

Android

True or false: Only the Apple App store and iTunes offer free mobile security apps.

False

True or false: Phishing is growing on social networking sites because criminals have easy access to the networks.

False

True or false: You should disable all cookies because they are attempts by websites to track your activities.

False

Which of the following is not one of the criteria of a strong password?

If should only contain dictionary words if they are spelled backward.

In some Facebook clickjacking events, the _____ button was a fake replica that redirected users to advertising that paid the criminal each time the scam worked.

Like

_____ is similar to phishing except that the individual is tricked into typing in personal information at a fake website that the user is redirected to when the real website address has been compromised by criminals.

Pharming

What type of infection occurs because a program disguises itself as beneficial software to the user?

Trojan horse

True or false: Data from IoT devices is at risk of interception by a hacker when the data is transmitted to a cloud storage website or to a smartphone.

True

Which of the following actions is not a typical method used by a cybercriminal to gain control of your computer without your knowledge?

You install a new hardware device that is infected with a virus.

Software that causes pop-up ads to appear on your PC while viewing a web page is called

adware

Which of the following is not a strategy to prevent unauthorized access to a network?

allow employees to use company-owned equipment for personal activities only during lunch breaks

Chapter 7 discusses several physical characteristics that can be used by a biometric device to authenticate a user. Which of the following is not one of them?

an ear scan

A collection of computers controlled by a cybercriminal and used to conduct an attack on another network is called a

botnet

In a _____ technique, a button, graphic, or link on a web page appears to be real but, when clicked, causes malicious software to run.

clickjacking

What is someone engaged in Wi-Fi piggybacking doing?

connecting to someone's wireless network without the network owner's consent

The illegal activities involving computers on the internet are collectively known as

cybercrime

What type of attack does this illustration depict?

denial of service

A macro virus is a virus that is

embedded in a document

White hats and black hats are types of

hackers

You can prevent your computer from becoming a zombie by using up-to-date antivirus software, updating the OS regularly, and

having a firewall active at all times

When shopping online, look for _____ in front of the URL to be sure the site is transmitting data using Transport Layer Security encryption.

https

When your personal information is stolen by a criminal who uses the data for financial gain while posing as you, you are the victim of

identity theft

What do firewalls monitor?

incoming and outgoing network traffic

Which term describes the right of individuals to exercise control over personal information that is collected about them?

information privacy

This type of spyware is sometimes promoted to parents as a way to monitor their children's online activities.

keyloggers

The general term for software that is designed to damage, disable, or steal data is

malware

A user receives a message that appears to be from a retailer she is familiar with. The message directs the user to click a link and enter her account information, which is then used fraudulently. This is known as

phishing

Your computer has been infected with _____ if a criminal has locked or otherwise restricted access to it and demanded that you pay for an unlock code.

ransomware

Users of a cloud storage service to store photos and documents control data privacy by

restricting who can see a file

Which type of malware is hard to detect because the software disguises itself as an essential operating system file?

rootkit

Phishing and pharming scams use _____ techniques, where a sender's email or IP address is altered to appear to be a trusted source.

spoofing

This type of software tracks your online activity without your knowledge.

spyware

A cookie is a small _____ placed on your computer by a web server.

text file

Which of the following is not a reason a hacker might launch a DoS attack?

to steal personal information

What should you do to secure your device from a Bluetooth intrusion when you are in a crowded public place?

turn Bluetooth on only when you need it; turn it off as soon as you are done with it

Which of the following is not an action that will provide security for your smartphone data in the event the device is stolen?

turning off the tethering feature

Jane opened an attachment in an email that she did not realize contained malware. The malware then spread automatically to other computers on the same network. The attachment contained a _____, which is a form of malware that replicates itself.

virus

Susan connected her laptop to a network that she did not realize was infected with malware. Later she discovered that her laptop had become infected with the same malware. Which type of infection is a self-replicating program that copies itself to any other computer connected to the same network?

worm

An internet-connected computer that is controlled by a cybercriminal without the owner's knowledge is called a _____ computer.

zombie


Related study sets

CHAPTER 5 - MORTGAGE LOAN ORIGINATION ACTIVITIES Study Guide

View Set

Research methods test 1-Chapter 1-4 (Review questions)

View Set