ITEC 1001 - Connect Ch 5

Ace your homework & exams now with Quizwiz!

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hacker

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This is called a _____ attack.

DDoS or DoS

What are the two common symptoms of a computer virus?

Documents will not save Programs launch on their own

Rootkits are typically used to allow hackers to do which three of the following?

Encrypt files Install rogue files Create backdoors

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

First-party cookie

The DMCA protects ___ from liability for copyright violations of its users.

ISP's

According to the U.S. Copyright Office, a copyright is a form of protection provided by the laws of the United States for "original works of authorship," including which three of the following?

Literary works Pictures Music

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Movies Video games

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called

adware

If you believe you have fallen victim to a phishing scam you should:

contact US-CERT contact the institution the message was allegedly sent from

A form of spyware that records all actions typed on a keyboard is called a ____logger.

keystroke or key

Stored in temporary memory, ____ cookies are used to analyze and measure traffic on a web page.

session

Software that illicitly collects information about your Internet surfing habits and behaviors is called

spyware

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.

word

A destructive program that replicates itself throughout a single computer or across a network is called a __.

worm

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____.

zombie

Which three of the following settings can you restrict in the Mac OS?

Limit access to specific websites Restrict user's access to other people through Game Center, Mail, and Messages Which apps the user can access

Computers infected with a virus exhibit many symptoms including which three of the following?

OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads

An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

Router Server Computer

After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?

Settings

On a MacIntosh home screen, which of the following you would click to access adjust parental control settings?

The Apple Menu

A group of compromised computers controlled by a hacker is called a _____.

botnet

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____.

hacker

A virus written in a macro language and placed within a document or spreadsheet is called a _____.

macro virus

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___.

ransomware

Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____.

script kiddie

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Most e-mail applications, such as Gmail and Outlook, provide robust ____ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

Which of the following are online nuisances?

-spam -spyware -spoofing

Which two of the following can help prevent a virus infection?

Adjust your web browser's security settings to allow browsing only on trusted sites. Never bypass your browser's built-in security features.

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

Advanced

Select three privacy risks associated with cookies.

Corporate and government entities can track your web behavior. Websites can track your surfing behavior and create a profile. Websites using cookies can collect your information and sell it to third parties.

DoS stands for:

Denial of Service and is malware that shuts down networks.

Cyberattacks include which three of the following?

Identity theft using a computer or network Distributed denial-of-service (DDOS) attacks Pharming

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) _____.

Trojan

T/F Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

Which of the following organization you should contact if you receive a phishing message?

US-CERT

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:

cyberbully

Harming or harassing via information technology and networks in a repeated and deliberate manner is called

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed of ____ service attack.

denial

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)

email

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

keystroke

Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

keystroke logging Trojan ransomware phishing

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an

online nuisance

Typically computer viruses must be _____ to attack and do damage to a digital device.

opened and run

To delete cookies in Safari, click ___.

preferences

Adware often accompanies downloaded _____.

programs

Software programs that hide in the operating system and allow for the installation of hidden files are called

rootkits

Unsolicited e-mail is __.

spam

Software that illicitly collects information about your Internet surfing habits and behaviors is called __.

spyware

A program that appears legitimate, but executes an unwanted activity when activated is called a ____ horse virus.

trojan

Small text file of information created by websites you visit that your web browser stores on your hard disk:

web cookie

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

When activated, saves all keystrokes for subsequent transmission to virus creator.

keystroke-logging Trojan

Intellectual property _____ protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

laws

There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?

making exceptions for cookies from specific websites or domains. blocking/allowing cookies by default. deleting cookies.

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called

pharming

Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called

phishing

Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

retpoline

Select two true statements about packet sniffers.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.

Which of the following are symptoms of an online nuisance attack?

Pop-up start appearing after you visit unfamiliar sites. Frequent pop-ups while searching the web or working in programs Receiving a lot of spam messages or bounced back e-mail messages.

When you open the options tab in Firefox, where would you click to adjust cookie settings?

Privacy & Security

When activated, encrypts files on user hard drive and then sells a decryption program.

Ransomware

To adjust cookies in Edge, where would you click first?

The 3-dot "Settings and more" icon

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Third-party cookie

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

copyright

Which two of the following are true about script kiddies?

Illegally gain access to computer systems using programs (scripts) that others have written. Amateur computer hackers with little programming expertise.

Safety-shield employs computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These Safety-shield employees are called _____.

white hat hackers

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

There are many Internet privacy laws to protect citizens and businesses from privacy attacks and breaches that are initiated via the Internet. These laws are created by both _____ and federal government. The main federal governmental organization that oversees Internet privacy is the Federal Trade Commission (FTC).

state

Computers that are infected with malicious software and under the control of another user are called:

zombies

An attack using a computer is a ___.

cyberattack

DDoS stands for:

Distributed Denial of Service. Computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic.

International laws on ____ privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Due to the lack of normalized laws it is important to use discretion on the Internet when traveling or living abroad.

Internet

You can change your Firefox settings to allow you to do which three of the following?

deny cookie storage requests. approve cookies storage requests. delete stored cookies automatically when you start Firefox.

Select three functions of session cookies.

Determine the web browser being used. Analyze and measure traffic on a web page. Determine the start and end of a session.

Signed into law by President Clinton in 1998, The ____ Millennium Copyright Act (DMCA) implements two World Intellectual Property Organization (WIPO) treaties.

Digital

T/F If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False Each browser is independent and requires that you adjust cookie settings in each one you use.

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____.

cyberterrorist Reasons: A hacker attempts to access networks or computers without authorization. A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. A script kiddie uses scripts obtained through YouTube or other means to try to hack into networks.

The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy.

internet

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

Email

Safari accepts cookies and website data from which of the following?

Only from websites you visit

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

Open the Advanced menu

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

Persistent

Tricks users into revealing usernames and passwords by appearing legitimate.

Phishing

Which of the following two statements best describe phishing?

Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank. Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information.

Which of the following are among a few U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?

COPPA The Children's Online Privacy Protection Act (COPPA) gives parents control over what information websites can collect from their kids. Red Flag's rule The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs of identity theft in their day-to-day operations.

After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

Click Remove All Website Data, or click Details then select one or more websites, then click Remove.

Select three true statements regarding persistent cookies.

Collect password and username information. Collect information about the Internet protocol (IP) Address. Collect information about user preferences.

The European Union's (EU) European Commission _____ Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Data

Which three of the following you should consider in the settings area of each browser?

Decide from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings

Which three of the following may be indications that your system has been hacked?

Fake e-mails or social media messages in your account Redirected Internet searches Unwanted browser toolbars

Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at ____ , a company better known for its search engine and its Pixel series smartphones.

Google


Related study sets

Introduction to Linux (Questions)

View Set

Chapter 2 - Hardware and Software

View Set

Nclex Review: Joint Replacement Surgery, Amputation

View Set

AP Human Geography Review - Unit Five

View Set

Econ 2000 Practice Tests 1 and 2

View Set

Fundamentals of Corporate Valuation

View Set