Chapter 7 Computers

Your page rank:

Total word count: 925
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following can be used to block unauthorized access while allowing authorized communication on a device or network?

Network router Personal Firewall Hardware that uses a NAT

What is the process called when an app from a source other than an official app store is installed on a device?

Side-loading

______Can be used to flood a web site with so much traffic that it can no longer provide its intended service.

DDoS Botnets Commands from a botmaster

Which of the following is not a characteristic of a weak password?

Eight characters in length and include one or more uppercase letters, numbers, and symbols

The best defense against malware is ________

Antivirus software

A ______ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communicate link to a hacker

RAT

______Software shields certain applications against behaviors commonly exhibited by intrusions.

Anti-Exploit

______Is a deceptive practice that exploits human psychology by introducing victims to interact with a digital device in a way that is not in their best interest.

Social Engineering

Spam accounts fro approximately ____ of all email.

70%

_____Is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

Smart Screen Filter

If you feel more secure with a totally random and unique password for each of your logins, then a (n) ________ is an excellent option

Password Manager

What is the term used to decribe unwatned software that installs along with the application software that you originally downloaded and installed?

PUP

A(n) ______ is a device or software that is designed to block unauthorized access while allowing authorized communications.

Firewall

A(n) _____Takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerablilities in hardwared or software.

Online intrusion

A virus _____ usually arrives as an email message that contains warnings about a supposedly new virus

Hoax

An ________ Attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

Zero-Day

A ____ Exploits usually begins with a virus warning and an offer to disinfect the infected device.

Rogue antivirus

A computer _____ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Virus

Which type of device is the top target for ransomeware?

Smartphones

To establish a(n) ____, Hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

Evil Twin

There are various encryption methods, but _____ is the Encryption standard currently used worldwide.

AES

______ Is a term for a person who devises and carried out a scam in order to accomplish a goal.
A. Main-in-the-middle
B. RAT
C. Internet worm
D. none of the above

D. None of the above

_____Changes an originating address or destination address to redirect the flow of data between two parties.

Address spoofing

Trojans depend on ______ to spread.

Social engineering

Which of the following is not a type of spam filter?

Entropy

Which of the following is not an example of authentication protocol?

Password PINs Fingerprint scanner

A cryptographic _____ Is a procedure for encryption or decryption.

Algorithm

_______ is the process of modifying an excutable file or data stream by adding additional commands.

Code Injection

MITM attacks include which of the following?

Address spoofing IMSI catchers Evil Twins

If you use a password manager, What do you as the user need to remember?

The Master Password

A(n) ______ Pings a packet of data to port in order to see if that port is open or not.

Port Scan

A password manager can store passwords in a encrypted file located at which of the following storage locations?

Local storage Cloud storage USB storage

A social engeneering scam called _____ is when a victim is promised a large sum of money in exchange for bank account number from which a small advance free is withdrawn.

Advance free fraud

Which of the following is not characteristic of a computer worm?

Spread through a process called side-loading

Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

Brute Force

When antivirus software detects malware, which of the following would not be a course of action you could take?

Conduct a heuristic analysis

Which of the following would be considered spyware?

Keylogger

Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

Encryption

Antivirus software can use techniques called _____ to detect malware by analyzing the characteristis and behavior of suspicious files.

Heuristic analysis

The current method of encrypting communication between a client and a server depends on a security protocol called_____.

TLS

The single most effective security measure for digital devices is to password protect access to them.

T

Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.

F

Most mass-mailing databases are legitimately compiled from customer lists.

F

Antivirus software cannot be expected to block threats that do not arrive in the form of malware.

T

Spam sent by scammers often uses spoofed email addresses.

T

Similar to a worm, a trojan is not designed to spread itself to other devices.

F

Most trojans are not designed to replicate themselves.

T

Most ISPs and email services do not use filtering techniques to block spam.

F

The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the internet.

F

Microsoft uses a service called Safe Browsing to alert users about sites to avoid.

F

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending