ITEC Chapter 7

Ace your homework & exams now with Quizwiz!

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality?

- Access control - Encryption - Authentication

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

- Access to important data is limited so that only certain employees are able to modify that data. - During an acquisition, logistics data are securely transferred to the acquiring company's servers.

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

- Authentication - Access control

Which three of the following statements are true about spyware?

- Collects information about your Internet surfing habits and behaviors. - Includes the collection of keystrokes, passwords, and confidential information - Installed via free downloads or by visiting certain illegitimate websites.

Which of the following are symptoms of an online nuisance attack?

- Pop-ups start appearing after you visit unfamiliar sites. - Receiving a lot of spam messages or bounced back e-mail messages. - Frequent pop-ups while searching the web or working in programs

Which three of the following are factors to consider to help protect the hardware of your digital device?

- Protecting a digital device from overheating - Protecting a digital device from humidity - Protecting a digital device from magnetic fields

Which of the following are online nuisances?

- Spam - Spoofing - Spyware

Select three privacy risks associated with cookies.

- Websites can track your surfing behavior and create a profile. - Websites using cookies can collect your information and sell it to third parties. - Corporate and government entities can track your web behavior.

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of:

- account numbers - keystrokes - passwords

If you believe you have fallen victim to a phishing scam you should:

- contact US-CERT - contact the institution the message was allegedly sent from

Select 3 ways in which computer virus commonly infect vulnerable digital devices. Multiple select question.

- opening an infected e-mail attachment - inserting and opening an - - infected thumb drive sharing an infected file

Firewall

A component of a network that is designed to prevent unauthorized Internet intrusions

Keystroke Logger

A cybercriminal uses this spyware to record all actions typed on a keyboard.

worm

A destructive program that replicates itself throughout a single computer or across a network

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

Availability

Pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing

Internet filter

Firewall software used to block a user's access to specific Internet content

Network Address Translation (NAT)

It provides a type of firewall protection by hiding internal IP addresses.

Ransomeware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code

Ransomware

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate.

Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.

UBE

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program.

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator.

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ .

e-mail virus

Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___.

email

Overheating, humidity, and magnetic fields can cause damage to the ____ of a digital device

hardware

Typical Password Manager

is installed as a browser plug in and provides for extremely secure logins.

Malware is short for_____.

malicious software

Experts suggest using password____ software to keep your passwords safe.

management

Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an ____ nuisance.

online

Adware often accompanies downloaded _____.

programs

Often, to actually launch an attack on a computer, a virus must be opened and ___.

run

In Facebook, where would you click to download a copy of your Facebook data?

settings

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Most e-mail applications, such as Gmail and Outlook, provide robust _____ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through.

spam

Which three of the following you should consider in the settings area of each browser?

- Blocking or customizing your cookie settings - Decide from which sites you want to allow cookies - Deleting cookies

Which two of the following can help prevent a virus infection?

- Never bypass your browser's built-in security features. - Adjust your web browser's security settings to allow browsing only on trusted sites.

zombie

A computer that has been taken over by a hacker, typically by using a rootkit

Cyber crime

A crime in which a computer is the object of the crime or is used to commit a criminal offense

Anti-malware apps

Help protect against malware: Anti-malware apps help protect against a variety of malicious programs.

computer virus

Software that infects computers and is created using computer code

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties

Which of the following three statements are true regarding macro viruses?

- Commands in the macro language set off the destructive events. - When file is opened the macro virus executes. - Initiated by downloading and opening an infected attachment.

Which of the following is an example of a tool that could be used to ensure data integrity?

- Data are regularly backed up. - Data correction codes are used to ensure the data retrieved are the same as when it was stored

Which of the following three statements are true regarding keystroke loggers?

- Keystroke loggers can record passwords and confidential information. - Software-based keystroke loggers can be installed by Trojans without the user's knowledge. - Can be hardware devices and software applications.

Which three of the following are well-known e-mail attacks?

- Keystroke-logging Trojan - Phishing - Ransomware

Which of the following three statements are true about Trojan malware?

- Often used to find passwords, destroy data, or to bypass firewalls. - Similar to viruses, but do not replicate themselves. - Often found attached to free downloads and apps.

An Internet/content filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?

- Server - Router - Computer

Cyberattack

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network

Keylogger

A form of spyware that records all actions typed on a keyboard

Botnet

A group of compromised computers controlled by a hacker

Adware

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements

Which three of the following are ways to prevent computer virus infections?

- Install the latest antivirus software and update frequently. - Web surfing should be limited to trusted sites. - Downloaded content from the web should only be from trusted sites.

Select two true statements about packet sniffers.

- Unauthorized sniffers are used to steal information. - Legitimate sniffers are used for routine examination and problem detection.

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

False

Trojan

Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated

Packet Sniffers

Specialized hardware or software that capture packets transmitted over a network

Which of the following are widely used tactics that can keep you safe on the Web?

- Consider using a VPN - Make sure the sites you visit use HTTPS if entering personal information: You should make sure the sites you visit use HTTPS. - Use your browser's private browsing mode.

Malware may be designed to do which three of the following?

- Destroy data - Incapacitate a computer or network - Steal information

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools ensures confidentiality. More than one answer may be correct.

- Encryption - Authentication - Access control

Which of the following may be indications that your system has been hacked? (Select all that apply.)

- Fake e-mails or social media messages in your account - The computer turns on or off by itself - Frequent random pop-ups - Unwanted browser toolbars

Computers infected with a virus exhibit many symptoms including which three of the following?

- Files get deleted or encrypted - OS does not launch properly - Strange error messages or pop-up ads

macro virus

A virus written in a macro language and placed within a document or spreadsheet

Ways to catch a computer virus

Downloading files from questionable Internet sites , Finding a thumb drive and then using it in your laptop

Anti-virus programs

Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats.

Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This software is called _____.

Spam filter

Typically computer viruses must be _____ to attack and do damage to a digital device.

open and run

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called ______.

pharming

The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ____.

phishing

According to US-CERT, if you receive a phishing message, which of the following methods should you use to report the issue?

- In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]. - Contact the via the phone number listed on the US-CERT site.

distributed denial-of-service (DDoS) attack

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests

Which of the following is true about worms?

Automatically reproduces itself

cyberbullying

Harming or harassing via information technology and networks in a repeated and deliberate manner

Virus symptoms

The operating system does not launch properly , Critical files are deleted automatically

Virtual Private Network (VPN)

a very useful tool in protecting your online identity. A VPN essentially hides your IP address to outside websites by running your communications through a secure network.

Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n)_____

email

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called____.

ransomware

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons

Password

A secret code used to help prevent unauthorized access to data and user accounts

Rootkit

A type of malware that is triggered each time you boot your computer

spam filter

Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox

Which of the following organization you should contact if you receive a phishing message?

US-CERT

Computer viruses can infect a digital device in which three of the following ways?

- Opening an infected e-mail attachment - Visiting a contaminated website - Downloading an infected file from the Internet

Which three of the following statements are true regarding passwords and passcodes?

- Passwords can be used to secure computers, networks, software, personal accounts, and digital devices - The terms passcode and key are synonymous for password - Keys are often generated by encryption software or by the vendor who produced the software

Which two of the following statements are true regarding firewalls?

- The Mac OS includes firewall protection. - Having more than one firewall app on your computer may cause conflicts and other problems.

Black hat hackers

A person who breaks into computer systems with the intent of causing damage or stealing data.

Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.

- Having standby equipment available to take over in a situation where the main system fails. - Ensuring that the data server has an appropriate amount of bandwidth. - Storing data on multiple hard drives.

Which of the following two statements best describe phishing?

- Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. - Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank.

Cookies

Small text files created by websites you visit that your web browser stores on your hard disk

Rootkits are typically used to allow hackers to do which two of the following?

- Install rogue files - Create backdoors


Related study sets

Qualitative Research Methodology

View Set

Common Garden Pests in Australia

View Set

To Kill A Mockingbird Plot Questions

View Set

Chapter 12 practice, Finance 435 chap 11

View Set

COMMON PERIPHERAL DEVICES COMPTIA

View Set

PMA Q&A MONITORING AND CONTROLLING 2

View Set

Financial Statements for a Sole Proprietorship

View Set