Chapter 7 Computers

7 January 2024
4.9 (248 reviews)
50 test answers

Unlock all answers in this set

Unlock answers (46)
question
Which of the following can be used to block unauthorized access while allowing authorized communication on a device or network?
answer
Network router Personal Firewall Hardware that uses a NAT
question
What is the process called when an app from a source other than an official app store is installed on a device?
answer
Side-loading
question
______Can be used to flood a web site with so much traffic that it can no longer provide its intended service.
answer
DDoS Botnets Commands from a botmaster
question
Which of the following is not a characteristic of a weak password?
answer
Eight characters in length and include one or more uppercase letters, numbers, and symbols
question
The best defense against malware is ________
answer
Antivirus software
question
A ______ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communicate link to a hacker
answer
RAT
question
______Software shields certain applications against behaviors commonly exhibited by intrusions.
answer
Anti-Exploit
question
______Is a deceptive practice that exploits human psychology by introducing victims to interact with a digital device in a way that is not in their best interest.
answer
Social Engineering
question
Spam accounts fro approximately ____ of all email.
answer
70%
question
_____Is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
answer
Smart Screen Filter
question
If you feel more secure with a totally random and unique password for each of your logins, then a (n) ________ is an excellent option
answer
Password Manager
question
What is the term used to decribe unwatned software that installs along with the application software that you originally downloaded and installed?
answer
PUP
question
A(n) ______ is a device or software that is designed to block unauthorized access while allowing authorized communications.
answer
Firewall
question
A(n) _____Takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerablilities in hardwared or software.
answer
Online intrusion
question
A virus _____ usually arrives as an email message that contains warnings about a supposedly new virus
answer
Hoax
question
An ________ Attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
answer
Zero-Day
question
A ____ Exploits usually begins with a virus warning and an offer to disinfect the infected device.
answer
Rogue antivirus
question
A computer _____ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
answer
Virus
question
Which type of device is the top target for ransomeware?
answer
Smartphones
question
To establish a(n) ____, Hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.
answer
Evil Twin
question
There are various encryption methods, but _____ is the Encryption standard currently used worldwide.
answer
AES
question
______ Is a term for a person who devises and carried out a scam in order to accomplish a goal. A. Main-in-the-middle B. RAT C. Internet worm D. none of the above
answer
D. None of the above
question
_____Changes an originating address or destination address to redirect the flow of data between two parties.
answer
Address spoofing
question
Trojans depend on ______ to spread.
answer
Social engineering
question
Which of the following is not a type of spam filter?
answer
Entropy
question
Which of the following is not an example of authentication protocol?
answer
Password PINs Fingerprint scanner
question
A cryptographic _____ Is a procedure for encryption or decryption.
answer
Algorithm
question
_______ is the process of modifying an excutable file or data stream by adding additional commands.
answer
Code Injection
question
MITM attacks include which of the following?
answer
Address spoofing IMSI catchers Evil Twins
question
If you use a password manager, What do you as the user need to remember?
answer
The Master Password
question
A(n) ______ Pings a packet of data to port in order to see if that port is open or not.
answer
Port Scan
question
A password manager can store passwords in a encrypted file located at which of the following storage locations?
answer
Local storage Cloud storage USB storage
question
A social engeneering scam called _____ is when a victim is promised a large sum of money in exchange for bank account number from which a small advance free is withdrawn.
answer
Advance free fraud
question
Which of the following is not characteristic of a computer worm?
answer
Spread through a process called side-loading
question
Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.
answer
Brute Force
question
When antivirus software detects malware, which of the following would not be a course of action you could take?
answer
Conduct a heuristic analysis
question
Which of the following would be considered spyware?
answer
Keylogger
question
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
answer
Encryption
question
Antivirus software can use techniques called _____ to detect malware by analyzing the characteristis and behavior of suspicious files.
answer
Heuristic analysis
question
The current method of encrypting communication between a client and a server depends on a security protocol called_____.
answer
TLS
question
The single most effective security measure for digital devices is to password protect access to them.
answer
T
question
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.
answer
F
question
Most mass-mailing databases are legitimately compiled from customer lists.
answer
F
question
Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
answer
T
question
Spam sent by scammers often uses spoofed email addresses.
answer
T
question
Similar to a worm, a trojan is not designed to spread itself to other devices.
answer
F
question
Most trojans are not designed to replicate themselves.
answer
T
question
Most ISPs and email services do not use filtering techniques to block spam.
answer
F
question
The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the internet.
answer
F
question
Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
answer
F