Security Fundamentals - Ch4 Unit 4 Quiz
How does an attacker use a malvertising attack? Java applets are attached to spam messages that pretend to be advertisements. Resource objects are sent as email attachments with a source that pretends to be a well-known advertising agency. Attackers directly infect the website that is being compromised by identifying a vulnerability in the web server. Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.
Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.
The most secure option when configuring a web browser for security is __________. Deny first-party and third-party cookies. Accept first-party cookies but deny third-party cookies. Reject locally shared objects but accept second-party cookies. Accept first-party cookies.
Deny first-party and third-party cookies.
What is the first step in defending against Internet-based attacks? Add security extensions to the web browser. Do not open email attachments. Use a web browser that supports automatic downloads. Ensure that the computer itself is properly secured.
Ensure that the computer itself is properly secured.
Bob's computer was infected from a drive-by download attack. What did Bob do to get infected? He unknowingly sent a virus to a website. He clicked Download. He viewed a website. He opened an email attachment.
He viewed a website.
What is the format used to write webpages? Hypertext Markup Language (HTML) Transmission Control Protocol/Internet Protocol (TCP/IP) Microsoft Adobe Printer (MAP) Hypertext Transport Protocol (HTTP)
Hypertext Markup Language (HTML)
Which of the following is the more recent and advanced electronic email system? IMAP (Internet Mail Access Protocol) Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP) Transmission Control Protocol (TCP)
IMAP (Internet Mail Access Protocol)
Which of the following is true about a cookie? It acts like a worm. It places a small file on the web server computer sent from the browser. It can contain a virus. It can pose a security and privacy risk.
It can pose a security and privacy risk.
Each of the following is true about the Internet except: Industry, governments, schools, and individuals all loosely cooperate in the Internet's self-governance. It is a local network of computers and networks. It is composed of networks to which devices are attached. It is not controlled by a single organization or government entity.
It is a local network of computers and networks.
Each of the following is an addition that could be added to a web browser to support dynamic browsing except ________. plug-ins JScript extension add-ons
JScript
Which is the most popular scripting code used with webpages? JavaScript Hypertext Markup Language (HTML) Hypertext Transport Protocol (HTTP) Java
JavaScript
Which of the following is not a secure Internet practice? Restrict cookies in web browsers through browser settings. Do not click on embedded hyperlinks in an email. Double-check spelling on a typed web address before submitting. Run JavaScript code to prevent attacks.
Run JavaScript code to prevent attacks.
Why should you not click on an embedded hyperlink? They seldom work properly. They can take up too much disk space on your computer. They are slow. They can take you to a different website other than what is being advertised.
They can take you to a different website other than what is being advertised.
Why would you want to block external content from downloading into your email client? To prevent spammers from knowing that your email address is valid To prevent your computer's graphics processor utility buffer from filling too quickly To slow down your email client so you can read the message To take advantage of the remote reading pane
To prevent spammers from knowing that your email address is valid
A(n) _____ is a list of email addresses from senders from whom you do not want to receive messages. whitelist greenlist blacklist redlist
blacklist
What technique do attackers use in order to circumvent text-based spam filters? image spam attachment spam Flash spam object spam
image spam
Which of the following is not a web browser addition to enhance security? website reputation plug-in validation local intranet flash signal URL expander
local intranet flash signal
Which type of cookie is the most complex? locally shared object (LSO) extender cookie (CE) control cookie (CC) plug-in cookie
locally shared object (LSO)
Which of the follow web browser additions provides links to external programs? extension add-on Java applet plug-in
plug-in
A cookie that was not created by the website that attempts to access it is called a(n)_____. third-party cookie resource cookie second-party cookie first-party cookie
third-party cookie
A reading pane allows the user to read an email message_________. only one time from a remote location after the attachment has been saved to the hard drive without actually opening it
without actually opening it