security

Ace your homework & exams now with Quizwiz!

a crime in which a computer is the object of the crime or is used to commit a criminal or offense is called ___

Cybercrime

Which of the following are ways to prevent computer virus infections?

Downloaded content from the web should only be from trusted sites Web surfing should be limited to trusted sites Install the latest antivirus software and update frequently

Adware often accompanies downloaded

Programs

Common types of malware include

Viruses, Trojans, Worms

the software code of a particular computer is called the virus ____

signature

On a MacIntosh home screen, where do you click to access to adjust parental control settings.

Apple, Settings

Select what is true about persistent cookies

Collect information about the IP Address Collect password and username information Collect information about user preference

a deliberate misuse of computers and networks, ___ use malicious code to modify the normal operations of a computer or network.

Cyberattacks

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a ___

Hacker

Select what is true about packet sniffers

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

Experts suggest using a password ___ software to keep your passwords safe.

Management

Select what is true about passwords

Passwords can be used to secure computers, networks, software, personal accounts, and digital devices The terms passcode and key are synonymous for password

Which of the following describes phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con users into giving up private information

Typically computer viruses must be ___ to attack and do damage to a digital device

Run

Computer software that Is designed to prevent spam messages from entering into a user's email inbox is called a ___ filter

Spam

which of the following are online nuisances?

Spoofing, Spyware, Spam

software that collects information about your Internet surfing habits and behaviors is called

Spyware

According to the FTC a few US internet privacy laws/rules of importance are:

The red flag rule, COPPA

The titles in the DMCA that directly impact digital copyright issues are

Title 2 Title 1 Title 3

The main government organization that oversees internet privacy in the United States in the Federal ___ Commission

Trade

which of the following are protected by intellectual property laws against unauthorized use or distribution

Video games Movies

Select what is true about worms

Automatically reproduce itself

Which of the following are considered e-commerce transactions?

B2B, B2C, C2C

Software that collect a user's web browsing history to create unsolicited targeted pop-up advertisements is called ___

Adware

One version of this malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This malware is called ___

Ransomware

Software programs that hide in the operating system and allow for the installation of hidden files are called ___

Rootkits

What type of cookie is stored in temporary memory and is lost when the web browser is closed

Session

antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are

Signature-based detection Heuristic-based detection

Select what's true about Trojan malware

Similar to viruses, but to not replicate themselves Often used to find passwords, destroy data, or bypass firewalls Often found attached to free downloads and apps

Specialized hardware or software that capture packets transmitted over a network are called packet ___

Sniffers

Select what is true regarding keystroke loggers.

Software based keystroke loggers are often a Trojan that is installed without the user's knowledge Can be hardware devices and software applications Keystroke loggers can record passwords and confidential information.


Related study sets

Exam 2: Native American Experience

View Set

Seizure/Sensory Perception ATI Q&A ***

View Set

chapter 8 - attitudes and persuasion

View Set