Security
only websites you visit
Safari accepts cookies and website data from which of the following?
virus
cannot boot computer running slower than newer
white hat
computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called _____ hackers
digital identity
personal data such as your social security # and birth date usernames/passwords online search activities
black hat
A _________ hacker breaks into computer systems with the intent of causing damage or stealing data
Zombie
A computer that is controlled by a hacker is called
cyberattack
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is
adjusting cookie settings
choose safari click preferences click privacy change settings
true about passwords
the terms passcode and key are synonymous for password passwords can be used to secure computers, networksm software, personal accounts, and digital devices
spam filter
computer software that is designed to prevent spam messages from entering into a user's email inbox is called
firewalls
helps protect against worms and hackers
cyberattacks include
identity theft, pharming, DDoS attacks
Phishing
illegitimate use of an email message that is sent to collect personal info and appears to be from an established organization such as a bank, financial institution, or insurance company is
single event
phising, trojan horse, keystroke logger
Digital Identity
social media postings online search activities purchasing behavior
online nuisances
spyware, adware,lots of spam, frequent pop ups
B2C
the process in which businesses sell to consumers
C2C
the process in which consumers sell to other consumers
cyberattacks
A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network
Computer, router, server
An internet filter can be installed on which of the following?
internet
the right of personal privacy concerning the storing, distributing and displaying info concerning oneself via the internet is ____ privacy
virus signature
the software code of a particular computer virus is called the
run
Typically computer virsuses must be ______ to attack and do damage to a digital device
Hacker
black hat, cyberterrorist,white hat, script kiddle
games, movies
which of the following are protected by intellectual property laws against unauthorized use or distribution?
internet privacy
who has access to data and info how data and info is used tech used to protect sensitive data and information
Internet filter
Firewall software used to block a user's access to specific internet content is called am
sniffers
Specialized hardware or software that capture packets transmitted over a network are called packet
C2C
a consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist
on-going series of events
blackmail, cyberstalking
how you should handle your cookies
blocking/customizing deleting cookies allow cookies from trusted sites
google chrome cookie settings include
deleting cookies blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains
common symptoms of a computer virus
documents won't save programs launch on their own
Management
experts suggest using password _____ software to keep your passwords safe
how to block firefox cookies from a website
go to website right click and select view page select permissions underneath set cookies
other computer term
hardware theft, software theft
incorrect
one of the positives of free anti-virus software is their spam detection performance
Spyware includes the collection of
passwords, account numbers,keystrokes
web cookie
small text file of information created by websites you visit that your web browser stores on your hard disk
NAT
the tech that provides a type of firewall protection by hiding internal IP addresses is called
macro virus
A virus written in a specific language and placed withing a document or spreadsheet is called
COPPA, the red flag rule
According to the FTC a few U.S internet privacy laws/rules of importance are
run
computer viruses typically must be _____ to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network
internet
International laws on ______ privacy vary greatly.
first-party cookie
small text file of info created by a website you visit that keeps track of your personal preferences and the current web browsing session
general
After clicking internet options what do you click next to delete cookies in explorer?
true
Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
70
Copyright works will pass into public domain ___ years after the death of the creator
Distributed Denial of service
DDoS attack stands for
address
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network ____ translation provides a type of firewall protection by hiding internal IP addresses.
Hacktivism
Hacking computer systems for a politically or socially motivated purposes is called _____
quarantine
If the software can't remove the infected file it will send the file to an isolated area on the hard disk called
safe
If you notice you are recieving fake antivirus messages, power down your computer and reboot your computer in _____ mode
Internet Explorer icon
If you want to delete cookies in explorer you should click the _____
script kiddies
Illegally gain access to computer systems using programs that others have written, Amateur computer hackers with little programming expertise
Privacy
In Mozilla firefox where would you click to adjust cookie settings
true about packet sniffers
Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information
malicious software
Malware stands for
popular password management apps
Norton,Dash, Last pass
Trojan
Often accompanying downloaded music or apps, programs that appear to be legitimate but executes an unwanted activity when activated is
ransomware
One version of this malware encrypts a victim's data until a payment is made. Another threatens to make public the victim's personal data unless a payment is made this is called
RFID
Passports issued by the U.S and many other countries include ____ Chips.
virus
Sharing infected files and opening an infected email attachment are ways that a computer ____ can infect a digital device.
digital
Signed into law by president Clinton in 1998, the _____ Millennium copyright act implements two world intellectual property organization treaties
true
Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars
Rootkits
Software programs that hide in the operating system and allow for the installation of hidden files are called
spyware
Software that collects info about yout internet surfing habits and behaviors is called
virus
Software that infects computers and is created using computer code is called a computer
property
The DMCA act implements two world intellectual _____ organization treaties
Trans-Pacific Partnership
The TPP stands for
Canada, Brunei, U.S
The TPP was negotiated by 12 countries including:
trade
The main governmental organization that oversees internet privacy in the united states is the federal _____ commission
Title 2,1,3
The titles in the DMCA that directly impact digital copyright issues are
40
The tpp covers just under __ % of global GDP
state
These laws are created by both _____ and federal gov't
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate.
proxy
What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?
internet options
Where should you click to delete cookies from explorer after opening the tool button
data corruption/theft, cyberbullying
Which of the following are considered cybercrimes?
allow,block and delete
Which of the following are cookie settings you can adjust in internet explorer
d
Which of the following are steps of how a virus infects a computer? a)copying itself b)running/opening files activates the virus c)arrives via email, download, visiting an infected site d)all the abober
B2C
a consumer makes a purchase from overstock.dom
hacker
a person who gains unauthorized access to networks and in order to steal and corrupt information and data is a
password
a secret code used to help prevent unauthorized access to data and user accounts is called a
a virus that is attached in a file in and sent via email message is called a ____ virus
copies
a worm is a type of malware that _____ itself throughout a single computer or across a network
programs
adware often accompanies downloaded
rootkits
allow remote users to create backdoors, delete files, and install rogue files
dos attack
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a
true about Ergonomics
an important element of workplace safety, derived from the Greek words ergon and nomoi, the study of human interaction with the objects they use.
how to remove cookies from safari
click-remove all website data, or click details then select one or more websites then click remove
functions of session cookies
determine the start and end of a session determine the web browser being used
cyberattack
dos attack, packet analyzer,rootkit
internet
firewall software used to block a user's access to specific internet content is called
true
if you adjust your cookie settings in chrome your cookie settings in firefox are automatically adjusted to match those of chrome
true about macro viruses
initiated by downloading and opening an infected attachment commands in the macro language set off the destructive events when file is opened the macro virus executes
virus
macro, trojan, worm
Ransomware
malware that encrypts victims' data files and demands payment for a decryption code
online nuisances
phishing, spoofing, trolling, spyware
true about trojan malware
similar to viruses(doesn't replicate) often used to find passwords, destroy data, or to bypass firewalls attached to free downloads and apps
third-party cookie
small text file of info created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
spam filter
software designed to prevent spam messages from entering his email inbox.
malware is for
steal info destroy data incapacitate a computer or network
session
stored in temporary memory, ____ cookies are used to analyze and measure traffic on a web page
persistent
stored on a user's hard drive, a type of cookie that collects info about user preferences, password/username info, ip address, and data on web surfing behavior is referred to as a _____ cookie
security
two of the main concerns that surrond digital identity are privacy and ______
Rootkit
type of malware that is triggered each time you boot your computer is called a _____
pharming
type of phising that seeks to obtain personal info through malicious software that is inserted on victims' computers and directs them to a fake webpage is
proxy servers, packet filters
typical firewall programs or hardware devices filter all info coming through the internet to your network or computer system
spam
unsolicited email is
Persistent cookies store information about
user preferences and password/username info
one of the risks of cookies
websites using cookies can collect your info and sell it to third parties
automatically reproduces itself
what is true abort worms?
privacy
which tab should you click to block cookies in internet explorer?
common types of malware
worms, Trojans, viruses
B2B
Alberstson's grocery store places an automated order for more Mountain dew from Pepsico via the internet
copyright
A form of protection provided by the laws of the United States for "original works of authorship"
keystroke
A form of spyware that records all actions typed on a keyboard is called a _______ logger
script kiddie
A hacker with little programming expertise who uses programs that other have written in an attempt to access networks
cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.