Table of Contents
2014 Digital Safety and Security
Question | Answer |
---|---|
_______ describe a scam in which a website includes a button, image or link that contains a malicious program? | clickjacking |
___________ up refers to making a copy of the file. | backing |
Software used by cybercriminals is referred to as _______. | crimeware |
Which of the following terms is used to describe a program that hides inside a harmless or useful program but then gets out and does damage to your computer?
A Trojan horse, commonly referred to simply as a “Trojan,” is a malicious program that is installed onto a host to perform a desired, or overt, function, but instead conceals and executes hidden, or covert, programs within its code to create backdoors, run scripts, steal information, and in some cases socially exploit …
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
A rootkit is a software program that hides itself in a computer. This program is used to get the access over a computer from a remote location.
How can malware be prevented?
Install Antivirus or Anti-Malware Software Browser-level protection: Some browsers (like Chrome) have built-in malware protection tools that help to protect you from such threats online. This helps to prevent malware from reaching your device via the browser but doesn’t scan your device for existing threats.
What is the meaning of Threatware?
The term threatware is commonly used to refer to computer programs that are designed to harm your computer. These types of programs include spyware, worms, Trojans viruses and other types of malware. As you may know, malware poses a serious threat to businesses and individuals.
What is another name for public key encryption?
Public key encryption is also referred to as asymmetric encryption because there is not just one key used in both directions as with the symmetric encryption. In public key encryption there are two keys; whichever one is used to encrypt requires the other be used to decrypt.
What happens when people steal personal?
An individual who tries to access a computer or network illegally. The act of stealing, defacing, or destroying computer equipment. Identity Theft. Occurs when someone appropriates your personal information without your knowledge to commit fraud or theft.
Which of the following keeps your computer safe by determining who is trying to access it?
A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.
Which is an example of a fake website?
The first example of a fake online shopping website is the type of ‘business’ that has a great site with many good-looking products, whether they are electronics, gadgets, clothes, or accessories.
Which is the best website to avoid scamming?
Avoid scams like the Ovahia Leggings one. There are a bunch of scammers who feature beautiful clothes on their websites, but when you purchase anything you will never get it. The target market of the online clothing store scammers is definitely the ladies.
What is the term used to describe software used by cybercriminals?
Many websites require a user to enter a private combination of characters associates with a user name that allows access to certain computer resources. What is the term for this combination of character? password Which term is used to describe software used by cybercriminals? crimeware
What’s the term for copying a photo from a website?
Copying a photo from a website and then using it without requesting permission. You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process