MISY Module 5 Quiz

Ace your homework & exams now with Quizwiz!

Cyberattack

-DOS attack -packet analyzer -rootkit

What are way that computer viruses can infect a digital device?

-opening an infected email attachment -downloading an infected file from the internet -visiting a contaminated website

What is considered Intellectual property?

-trade secrets -trademarks -patents

Persistent cookies store information about:

-user preferences -password and username information

What is protected by intellectual property laws against unauthorized use or distribution?

-video games -movies

Virus

-worm -trojan horse -macro -you cannot boot your computer -your computer is running slower than usual

On ___________ in the US the liability of paying for the fraud will fall on the party that is least chip-enabled.

October 1, 2015

A computer game (also referred to as ________ games) is where players interact with objects displayed on a screen for entertainment purposes using a computer.

PC

Juan attempts to gain unauthorized access to networks. Juan would be considered a ____________.

hacker

A form of spyware that records all actions typed on a keyboard is called a _________ logger.

key

What are the common symptoms of a computer virus?

-programs launch on their own -documents will not save

A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a __________.

cyberattack

A digital presence created online by an individual, organization using a digital device is called a ____________ identity.

digital

A destructive program that replicates itself throughout a single computer or across a network is called a __________.

worm

According to the FTC, a few US internet privacy laws/rules of importance are:

-COPPA: the Children's Online Privacy Protection Act gives parents control over what information websites can collect from their kids -the Red Flags Rule: the red flags rule requires many businesses and organizations to implement a written identity theft prevention program designed to detect the warning signs --- of identity theft in their day-to-day operations

What is true about WhatsApp Messenger?

-WhatsApp currently has over 900 million users worldwide -The logo for the WhatsAppMessenger is green with a white phone

Safari accepts cookies and website data from which of the following?

-only from websites you visit

Ways to catch a computer virus:

-opening suspicious or infected email messages -visiting questionable websites -downloading files from the internet

A digital identity is composed of a variety of digital attributes including:

-personal data such as your social security number and birth date -usernames and passwords -online search activities

Single event

-trojan horse -phishing -keystroke logger

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or ________.

Netiquette

Passports issued by the US and many other countries include ___________ chips.

RFID

If your debit card is fraudulently used to make a purchase there is no guarantee that your money will ever be replaced. This is especially true if you wait too long to report the fraud. True or False?

True

Ways to avoid a computer virus:

-adjust your web browser's security settings to allow browsing only on trusted sites -surf the web and download content safely -purchase a new router every other year to ensure you have the latest firewall protections

If you believe you have fallen victim to a phishing scam you should:

-contact the institution the message was allegedly sent from -contact US-CERT

On-going series of events

-cyberstalking -blackmail

Online Nuisance

-frequent pop-ups while searching the web or working in programs -receiving a lot of spam emails and bounced back email -pop-ups start appearing after visiting unfamiliar sites

Social media integrates a variety of multimedia including:

-images -websites -messaging -video

What is true about passwords?

-use a combination of letters, symbols, and numbers. the more characters you use, the more secure your password will be -check your accounts. regularly check your accounts to ensure they have not been tampered with

What technology allows for the electronic communications of business-oriented transactions and information between people and organizations?

EDI

In the US the federal ________ covers most consumer oriented electronic transactions.

EFT Act

Free openly licensed learning resources that are available online for instructors and students to use are called Open _______ Resources.

Education

International laws on internet privacy are very similar. True or False?

False

The technical term for electronic or online banking that uses computers and various technologies in place of checks and other paper transactions to transfer funds from one account to another is called Electronic _________ Transfer.

Funds

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called __________.

adware

Transferring a file from the Internet to your digital device is called __________.

downloading

A virus that is attached in a file in and sent via email message is called a(n) _________ virus.

email

The standard code of respectful behavior in society or among members of a particular profession or group is called ________.

etiquette

A popular free online payment service that allows you to send money and accept payments without revealing your personal financial information is __________.

paypal

A type of malware that is triggered each time you boot your computer is called a ____________.

rootkit

Stored in temporary memory, _________ cookies are used to analyze and measure traffic on a web page.

session

Spyware

software that collects information about your internet surfing habits and behaviors, but is used for more malicious activities such as identity theft


Related study sets

Psychology of Emotion | Midterm 2

View Set

Chapter 16: Drug Therapy to Decrease Pain, Fever, and Inflammation PrepU

View Set

Chapter 4: Final Exam Review Questions

View Set

Arabic: Rosetta Stone Vocabulary Unit 1

View Set

Bio Section 3-1. What is Ecology

View Set

Ch 08: Security Strategies and Documentation

View Set