Questions PDF

Title Questions
Course English
Institution Addis Ababa University
Pages 10
File Size 165.9 KB
File Type PDF
Total Downloads 85
Total Views 183

Summary

2019 Exam...


Description

1. Stored in temporary memory, cookies are used to analyze and measure traffic on a web page. a. Session 2. Web cookie- Small text file of information created by websites you visit that your web browser stores on your hard disk: First-party cookie- Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session Third-party cookie- Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy 3. One of the risks with cookies is websites using cookies can collect your information and sell it to third parties 4. Which three of the following you should consider in the settings area of each browser? a. Deleting cookies b. Decide from which sites you want to allow cookies c. Blocking or customizing your cookie settings 5. Firewall software used to block a user’s access to specific Internet content is called a(n) _____ filter. a. Internet 6. What type of cookie is stored in temporary memory and is lost when the web browser is closed? a. Session 7. Which two of the following statements are true regarding firewalls? a. Having more than one firewall app on your computer may cause conflicts and other problems. b. The Mac OS includes firewall protection. 8. Small text files created by websites you visit that your web browser stores on your hard disk are called a. Cookies 9. Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a a. Firewall 10.Select three privacy risks associated with cookies. a. Websites using cookies can collect your information and sell it to third parties. b. Websites can track your surfing behavior and create a profile. c. Corporate and government entities can track your web behavior. 11.The technology that provides a type of firewall protection by hiding internal IP addresses is called a. NAT (network address translation)

12.If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome. a. False 13.An Internet filter is firewall software used to block a user’s access to specific Internet content. An Internet filter can be installed on which three of the following? a. Computer b. Server c. Router

14.

Match the following terms to their proper description.

a. Firewalls-Help protect against worms and hackers: Firewall programs help protect against worms and hackers b. Anti-virus programs- Help protect against viruses: Anti-virus programs help to protect your system from a variety of virus threats. c. Anti-malware apps- Help protect against malware: Anti-malware apps help protect against a variety of malicious programs. 15.

What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?

a. Proxy 16.

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network __________ Translation provides a type of firewall protection by hiding internal IP addresses.

a. Address 17. Put the following steps in the correct order for navigating to the windows firewall area a. Click the start button b. Click the setting icon

c. Click update and security d. Click windows security 18.Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. Which two of the following are techniques used to minimize the risk of harmful intrusions into a computer or network? a. Packet filters b. Proxy servers 19.The Windows Security in Microsoft Windows is accessed by clicking Control Panel then Update and Security. Which three of the following firewall settings you can adjust by clicking Firewall & network protection? a. Change notification settings

b. Update your firewall settings c. Turn Windows firewall on or of 20.

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a a. cyberattack, cyber attack, cybercrime, or cyber crime 21. Harming or harassing via information technology and networks in a repeated and deliberate manner is called a. cyberbullying, bullying, cyber bullying, or cyberattack 22. A crime in which a computer is the object of the crime or is used to commit a criminal ofense is called a. Cybercrime 23. A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a a. Cyberterrorist 24. Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called

a. Script Kiddie 25.

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network. a. Cyberattacks 26. A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a: a. Cyberbully 27. What type of hacker breaks into computer systems with the intent of causing damage or stealing data? a. Black hat hacker 28. A crime in which a computer is the object of the crime or is used to commit a criminal ofense is called a. cybercrime or cyber crime

29.

Juan attempts to gain unauthorized access to networks. Juan would be considered a _____ a. Hacker 30. Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber a. terrorist, cyber terrorist, or cyber-terrorist 31. Wyatt is a hacker with little programming expertise who uses programs that others have written in an attempt to access networks. Wyatt is a(n) _____. a. script kiddie 32. Hacking computer systems for politically or socially motivated purposes is called _____ a. Hacktivism 33. A _________hat hacker breaks into computer systems with the intent of causing damage or stealing data

a. Back 34.

Safety-shield employs computer experts who test the security measures of an organization’s information systems to ensure they are protected against intrusions. These Safety-shield employees are called a. white hat hackers 35. A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a a. Hacker 36. Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars. a. True 37. A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is a. Hacktivism 38. Which three of the following may be indications that your system has been hacked?

a. Unwanted browser toolbars b. Fake e-mails or social media messages in your account c. Redirected Internet searches 39.

Which one of the following statements is true when comparing feebased antivirus software to free antivirus software? a. Fee-based antivirus software often provides more features than free anti-virus software 40. A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____ a. antivirus software 41. A user account is often identified by a user name. A secret code used to help prevent unauthorized access to data and user accounts is called a ____. I a. Password 42. Wyatt needs a password for his school’s e-mail system. Which password is the most secure?

a. Xj9%ft7 43.

Which two of the following are ways to safely download antivirus software?

a. Download the software from a known antivirus software vendor b. Download the software from a trusted site like www.cnet.com 44. Select two true statements about fee-based (subscription-based) and free antivirus software programs. a. One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance b. Most fee-based software comes with technical support 45. Is your computer at risk? (Drag the correct response to the empty box) a. Heuristic and signature-based detection are two techniques used by ___ software. i. Antivirus 46. Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____ a. Quarantine 47. Which three of the following statements are true regarding passwords and passcodes? a. The terms passcode and key are synonymous for password b. Passwords can be used to secure computers, networks, software, personal accounts, and digital devices c. Keys are often generated by encryption software or by the vendor who produced the software 48. Which 2 of the following statements are true about passwords? a. Use a combination of letters, symbols, and numbers. The more characters you use, the more secure your password will be. b. Check your accounts. Regularly check your accounts to ensure they have not been tampered with. 49. It is important to think before you click when you _______ software from the Web. a. downloading or download 50. The software code of a particular computer virus is called the virus a. Signature 51. Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are: a. signature-based detection b. heuristic-based detection 52. Which three of the following are factors to consider to help protect the hardware of your digital device? a. Protecting a digital device from humidity b. Protecting a digital device from magnetic fields

c. Protecting a digital device from overheating 53. Which two of the following are ways to safely download antivirus software? a. Download the software from a trusted site like www.cnet.com b. Download the software from a known antivirus software vendor 54. Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____. a. Adware 55. A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims’ computers and directs them to a fake webpage is called a. Pharming 56. The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called a. Phishing 57. Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called a. Adware 58. Computer software that is designed to prevent spam messages from entering into a user’s e-mail inbox is called a ______ filter a. Spam 59. Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as a. Pharming 60. Most e-mail applications, such as Gmail and Outlook, provide robust _______ filters to help block unsolicited e-mail messages. Unfortunately, some spam always seems to get through a. Spam 61. In Facebook, where would you click to download a copy of your Facebook data? a. Setting 62. Illegitimate e-mail messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company is called a. Phishing 63. DeSean received an unsolicited e-mail message from an unknown sender. This e-mail was a. Spam 64. Ted installs computer software designed to prevent spam messages from entering his e-mail inbox. This type of software is called a __ filter. a. Spam 65. Which of the following are online nuisances?

a. Spoofing b. Spam c. Spyware 66. Which of the following statements best describe phishing? a. Phishing scams use legitimate-looking e-mail messages to con a user into giving up private information. b. Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank. 67. The illegitimate use of an e-mail message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called a. Phishing 68. Most viruses are hidden as a link from a corrupted website, an attachment to downloaded software, or as an attachment to a(n) ___. a. Email 69. A program that appears legitimate, but executes an unwanted activity when activated is called a _______ horse virus. a. Trojan 70. A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a _________ An army of these are used to launch denial of service (DoS) attacks. a. zombie or botnet 71. Software that infects computers and is created using computer code is called a computer _____. a. Virus 72. A destructive program that replicates itself throughout a single computer or across a network is called a __. a. Worm 73. Often a computer virus will arrive with a software download, as a link from a corrupted website, or as an attachment to a(n) a. email, e-mail, or Email 74. An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a distributed __________ of Service attack. a. DoS, denial of service, DDoS, distributed denial of service, or denial 75. Often accompanying downloaded apps, a program that appear to be legitimate, but executes an unwanted activity when activated, is called a(n) a. Trojan 76. Which three of the following are well-known e-mail attacks?

a. Phishing b. Ransomware c. Keystroke-logging Trojan 77.

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___. a. Zombie

78.

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a _____ logger. a. Keystroke 79. Often, to actually launch an attack on a computer, a virus must be opened and ___. a. Run 80. A virus written in a macro language and placed within a document or spreadsheet is called a _____ . a. macro virus 81. A destructive program that replicates itself throughout a single computer or across a network is called a __. a. Worm 82. Select two true statements about packet snifers.

a. Unauthorized snifers are used to steal information. b. Legitimate snifers are used for routine examination and problem detection. 83.

A DDoS attack is when computers that have been infected by a virus act as “zombies” and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___. a. Distributed Denial of Service 84. Malware that encrypts a computer’s data, forcing the victim to purchase a decryption code, is called ___.

a. Ransomware 85.

A spear-phishing attack is a phishing attack that targets a specific individual. This is commonly launched with a(n) ___ . a. e-mail virus 86. A form of spyware that records all actions typed on a keyboard is called a ____ logger

a. Keystroke 87.

Software programs that hide in the operating system and allow for the installation of hidden files are called a. Keystroke 88. Software programs that hide in the operating system and allow for the installation of hidden files are called a. Rootkits 89. A virus written in a specific language and placed within a document or spreadsheet is called a __ virus a. Macro 90. Software that illicitly collects information about your Internet surfing habits and behaviors is called a. Spyware 91. Specialized hardware or software that capture packets transmitted over a network are called packet a. Snifers 92. Malware that encrypts a computer’s data, forcing the victim to purchase a decryption code, is called ___

a. Ransomware

93. Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____. a. Zombie 94. Which of the following three statements are true regarding keystroke loggers?

a. Can be hardware devices and software applications. b. Software-based keystroke loggers can be installed by Trojans without the user’s knowledge. c. Keystroke loggers can record passwords and confidential information. 95. Rootkits are typically used to allow hackers to do which three of the following?

a. Install rogue files b. Encrypt files c. Create backdoors 96. Software that illicitly collects information about your Internet surfing habits and behaviors is called __. a. Spyware 97.

a. Phishing- Tricks users into revealing usernames and passwords by appearing legitimate.

b. Ransomware- When activated, encrypts files on user hard drive and then sells a decryption program.

c. Keystroke-logging Trojan- When activated, saves all keystrokes for subsequent transmission to virus creator.

98. A group of compromised computers controlled by a hacker is called a _____. a. Botnet 99. A form of spyware/surveillance technology that records all typed actions is referred to as a ___. a. keystroke logger 100. Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at ____________ , a company better known for its search engine and its Pixel series smartphones. a. Google 101. A type of malware that is triggered each time you boot your computer is called a

a. Rootkit Select 3 ways in which computer virus commonly infect vulnerable digital devices

102.

a. sharing an infected file b. inserting and opening an infected thumb drive c. opening an infected e-mail attachment Many cyber attacks are transmitted via email. Select 3 common forms of malware that are commonly sent by email.

103.

a. keystroke logging Trojan b. phishing c. ransomware

Specialized hardware or software that capture packets transmitted over a network are called packet a. Snifers 105. Initially, the U.S. Computer Emergency Readiness Team determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google announced that it developed ___, a strategy to mitigate the Meltdown and Spectre vulnerabilities. a. Retpoline 106. Which two of the following can help prevent a virus infection?

104.

a. Never bypass your browser’s built-in security features. b. Adjust your web browser’s security settings to allow browsing only on trusted sites. Computer viruses can infect a digital device in which three of the following ways?

107.

a. Visiting a contaminated website b. Downloading an infected file from the Internet c. Opening an infected e-mail attachment 108. Which three of the following are ways to prevent computer virus infections? a. Web surfing should be limited to trusted sites. b. Downloaded content from the web should only be from trusted sites. c. Install the latest antivirus software and update frequently. 109....


Similar Free PDFs