adware - ANSWER What type of malware is spyware that collects
information about the user's browsing habits to display advertisements in
the browser targeted to that user
false - ANSWER FileVault, a feature of some editions of Windows,
allows you to encrypt an entire drive
true - ANSWER Windows will warn you if you try to log on with the Caps
Lock key turned on.
botnet - ANSWER What term describes a group of networked computers
infected with malware that forward information to other computers?
proxy service - ANSWER Also called an application-layer gateway, this
software will watch for application-specific traffic, acting as a stand-in for
internal computers
false - ANSWER We recommend that you block first-party cookies and
allow third-party cookies.
browser hijacking - ANSWER What type of threat points your browser's
home page to a website you did not chose, and may even keep you from
changing the default home page for the browser?
false - ANSWER Windows EFS encrypts entire drives
Sneakernet - ANSWER What is the oldest malware vector?
VPN (Virtual Private Network) - ANSWER Combine this technology with
a firewall for a very safe way to connect two private networks over the
Internet
,zombie - ANSWER What term is used for a computer that belongs to a
group of networked computers, all working mindlessly to serve the
person who installed the program on the computers?
brute-force - ANSWER What term describes a password cracker that
tries a huge number of possible passwords?
false - ANSWER You must use data wiping software on a hard drive
before installing a new operating system
rootkit - ANSWER Once installed, this type of malware becomes a vector
giving other malware administrative access to a computer
vector - ANSWER What is the generic term for a mode or method of
malware infection?
false - ANSWER A Windows computer that is a member of a domain will
have a local account named Administrator that you can access when
your computer starts up in Safe Mode.
personal firewall - ANSWER It is a good idea to install or enable one of
these on your computer, even if your network has similar protection
between it and other networks.
sudden computer slowdown - ANSWER Which of the following is among
the symptoms of a possible malware infection?
false - ANSWER Cookies are always a threat
firewall - ANSWER This software or hardware device examines network
traffic and allows or rejects traffic into a network or computer based on
predefined rules
spam filter - ANSWER This type of software protects against unsolicited
e-mail, filtering out those that have certain characteristics
spim - ANSWER What term describes unsolicited instant messages?
, false - ANSWER HTTPS uses a private key to encrypt data between a
client and an e-commerce server
administrator - ANSWER Your computer has been showing signs of a
malware infection, and today it started up in Safe Mode. Because your
computer is not a member of an Active Directory domain, what all-
powerful built-in account can you log on with?
true - ANSWER FileVault is a data encryption feature in OS X.
true - ANSWER When you access a Web page to pay for an online
purchase, it should show HTTPS as the protocol in the address line
worm - ANSWER What type of malware replicates itself on a computer
or throughout a network?
zero-day exploit - ANSWER What term describes malware that takes
advantage of a vulnerability in an operating system or application that is
(as yet) unknown to the publisher, leaving systems using that software
vulnerable until the vulnerability is detected and patched?
UAC (User Account Control) - ANSWER You attempt to install software
in Windows; and although you are logged on with a computer
administrator type of account, your screen turns grey and you receive a
message asking if you want to allow the program to make changes to
the computer. What Windows feature is at work here?
Social Engineering - ANSWER An e-mail containing enticements (often
appealing to human weaknesses) to open attachments is a form of what
type of threat?
hoax - ANSWER You receive an e-mail message from a friend claiming
that she is in another country, in trouble, and urgently needs money
wired to her. You call the friend, and discover that she is safe at home
and did not know about the message. This scenario is an example of
a/an ___
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller luzlinkuz. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.