Security
If your debit card has been compromised, the U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within 2 business days of learning about it.
$50
Put the following steps in the correct order for adjusting cookie settings for safari
1. choose safari 2. preferences 3. privacy 4. cookie settings
Which of the following are considered e-commerce transactions?
B2C C2C B2B
Rootkits are typically used to allow hackers to do which three of the following?
Create backdoors Install rogue files Encrypt files
Signed into law by President Clinton in 1998, The _________ implements two World Intellectual Property Organization (WIPO) treaties.
DMCA (Digital Millennium Copyright Act)
Function of session cookies
Determine the web browser being used. Determine the start and end of a session. Analyze and measure traffic on a web page.
DDoS stands for ___.
Distributed Denial of Service
common symptoms of a computer virus
Documents will not save Programs launch on their own
The DMCA protects ___ from liability for copyright violations of its users
ISP's
An Internet filter is firewall software used to block a user's access to specific Internet content. An Internet filter can be installed on which three of the following?
Server Computer Router
First- party cookie
Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Ransomware
When activated, encrypts files on user hard drive and then sells a decryption program.
A Radio frequency identification (RFID) systems consists of three components
antenna, transponder, and transceiver.
hacker that breaks into computer systems with the intent of causing damage or stealing dat
black hat
A group of compromised computers controlled by a hacker is called a _____.
bootnet
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a
denial of service
A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger.
keystroke logger
A virus written in a macro/ specific language and placed within a document or spreadsheet is called a
macro virus
Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an
online nuisance.
Specialized hardware or software that capture packets transmitted over a network are called
packet sniffers
What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?
proxy
U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities.
retpoline
Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts)
script kiddies
After opening the Settings and more menu in Edge (as in the image) where would you click to adjust cookies?
settings
The software code of a particular computer virus is called the virus
signature
Software that illicitly collects information about your Internet surfing habits and behaviors is called
spyware
U.S. Internet privacy laws/rules of importance according to the Federal Trade Commission (FTC)?
the Red Flags Rule (Program designed to detect the warning signs of identity theft) COPPA (The Children's Online Privacy Protection Act)
Computer experts who attempt to hack into a network to ensure that it is protected against intrusions are called
white hat hackers
If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to _____.
$500
The main federal governmental organization that oversees Internet privacy is the
(FTC) Federal Trade Commission
turning on Parental Controls in Microsoft Windows.
1. parental control 2. standard user account you want to set controls for 3. click "on" and enforce settings 4. adjust time limits, access specific programs/ websites
set parental controls in Mac OS X.
1. preferences, parental control 2. unlock lock icon, enter admin name and password 3. select user, enable parental control 4. add and create new user if not on the list
order for navigating to the Windows firewall area.
1. start button 2. setting icon 3. update and security 4. windows security
Computers infected with a virus exhibit many symptoms including
OS does not launch properly Files get deleted or encrypted Strange error messages or pop-up ads
Safari accepts cookies and website data from which of the following
Only from websites you visit
Cyberattacks include:
Pharming Distributed denial-of-service (DDOS) attacks Identity theft using a computer or network
Web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk
Intellectual property include
Trademarks Trade secrets Patents
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate.
Which of the following organization you should contact if you receive a phishing message?
US CERT (United States Computer Emergency Readiness Team)
Keystroke-logging Trojan matches
When activated, saves all keystrokes for subsequent transmission to virus creator
Which three of the following settings can you restrict in the Mac OS?
Which apps the user can access Restrict user's access to other people through Game Center, Mail, and Messages Limit access to specific websites
Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called
adware
Having more than one firewall app on your computer may cause _______ and other ____
conflicts and problems
Transactions conducted between established businesses and consumers, such as purchasing a book from Amazon.com, are considered a business-to______ transaction
consumer
A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a:
cyberbully
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
cybercrime
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is
hacktivism
RFID (radio frequency identification.) characteristics: - RFID does not require __________ - Can be used to identify or track a variety of objects including poker chips, products, and even _______.
line-of-sight scanning animals
There are a variety of cookie settings that can be adjusted in Google Chrome including which 3 of the following?
making exceptions for cookies from specific websites or domains. deleting cookies. blocking/allowing cookies by default.
Fee-based antivirus software often provides _______ features than free anti-virus software.
more
Digital Identity
online search activities purchasing behavior social media postings
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
pharming
When you open the options tab in Firefox, where would you click to adjust cookie settings?
privacy and security
A type of malware that is triggered each time you boot your computer/ installation of hidden files hidden in OS is called a
rootkit
an unsolicited e-mail message from an unknown sender
spam
A destructive program that replicates itself throughout a single computer or across a network is called a __.
worm
ergonomics
A very important element of an effective workplace safety plan. Derived from the Greek words ergon (work) and nomoi (natural laws). The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.
passwords and passcodes?
Keys are often generated by encryption software or by the vendor who produced the software Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password
The ____ OS includes firewall protection.
Mac
In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?
Open the Advanced menu
Third- party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.
UBE (Unsolicited Bulk E-mai)
Computer software that is designed to prevent spam messages from entering into a user's e-mail inbox is called a
spam filter
Internet privacy
who has access to data/ information how data/ info is used techniques and technology that is used to protect sensitive data
Spam filters search for spam by watching for keywords and by monitoring suspicious _____ patterns and frequencies.
word
fee-based (subscription-based) and free antivirus software programs.
One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance Most fee-based software comes with technical support
Which settings can you adjust by clicking Firewall & network protection?
Turn Windows firewall on or off Update your firewall settings Change notification settings
Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that two vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.
Meltdown and Spectre
After you have clicked the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?
Click Remove All Website Data, or click Details then select one or more websites, then click Remove.
According to US-CERT, if you receive a phishing message, how do you report it
Contact the via the phone number listed on the US-CERT site. In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send it to [email protected]