Computer Security Chapter 12
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term 'malware' refer to?

  • Hardware damage
  • Network configuration
  • Internet speed issues
  • Malicious software (correct)
  • How does a computer virus typically infect another computer?

  • Via system updates
  • By attaching itself to documents or software (correct)
  • By accessing the internet directly
  • Through direct network connections
  • What is a characteristic of a Trojan horse?

  • It behaves like a useful program but contains malicious code (correct)
  • It replicates itself to other systems
  • It deletes files on the computer
  • It can only be installed through USB drives
  • What is the primary function of worms in malware?

    <p>To slow or disrupt network operations (C)</p> Signup and view all the answers

    What should individuals regularly do to protect their computers from malware?

    <p>Use antivirus and update it regularly (B)</p> Signup and view all the answers

    What is the main goal of phishing attacks?

    <p>To convince users to share personal information (A)</p> Signup and view all the answers

    Which type of malware is designed to replicate and spread automatically?

    <p>Worm (D)</p> Signup and view all the answers

    Why do organizations often have written security policies regarding software installation?

    <p>To prevent unauthorized software installations (C)</p> Signup and view all the answers

    What are smart watches designed to combine?

    <p>The functions of a watch and some mobile device functions (D)</p> Signup and view all the answers

    Which feature is common in most smart watches?

    <p>Touchscreen display (D)</p> Signup and view all the answers

    What is the primary purpose of fitness monitors?

    <p>To track daily activity and body metrics (C)</p> Signup and view all the answers

    How do smart headsets primarily connect to the internet?

    <p>By connecting to a smartphone (D)</p> Signup and view all the answers

    What type of devices are considered wearable devices?

    <p>Smartwatches and fitness trackers (B)</p> Signup and view all the answers

    What is a unique feature of smart headsets?

    <p>They have a display visible to the wearer (D)</p> Signup and view all the answers

    Which statement is true about the functionality of laptops and mobile devices?

    <p>They can operate on battery power and are lightweight. (A)</p> Signup and view all the answers

    Which of the following can fitness monitors do?

    <p>Upload activity data for review (B)</p> Signup and view all the answers

    What is the primary function of antivirus protection?

    <p>To continuously monitor for viruses (A)</p> Signup and view all the answers

    Which type of protection warns users about unsafe programs before they are installed?

    <p>Trusted / untrusted sources protection (D)</p> Signup and view all the answers

    What action should you take when encountering a suspicious warning window?

    <p>Close the tab or browser (D)</p> Signup and view all the answers

    Why is it recommended to run only one malware protection program at a time?

    <p>Multiple programs can conflict with each other (A)</p> Signup and view all the answers

    What is the role of phishing protection software?

    <p>To block IP addresses of known phishing sites (D)</p> Signup and view all the answers

    What might a rogue antivirus product do to trick users?

    <p>Pretend to clean an actually infected computer (B)</p> Signup and view all the answers

    What is a common method to handle a persistent malicious warning window?

    <p>Press ALT+F4 to close the window (D)</p> Signup and view all the answers

    What type of software actively searches for programs that display advertisements?

    <p>Adware protection (B)</p> Signup and view all the answers

    What action is used to zoom in on objects on a mobile device?

    <p>Touch the screen with two fingers and spread them apart (D)</p> Signup and view all the answers

    What is the purpose of a proximity sensor in a smartphone?

    <p>To turn off the touchscreen when near the user's ear (B)</p> Signup and view all the answers

    What feature distinguishes laptops from desktop computers?

    <p>Laptops are typically more lightweight. (A)</p> Signup and view all the answers

    Which of the following is NOT a common input device found in laptops?

    <p>Monitor (B)</p> Signup and view all the answers

    Which of the following describes accessories for mobile devices?

    <p>They enhance the user experience but are not necessary. (C)</p> Signup and view all the answers

    What kind of power source do laptops use?

    <p>Either battery or AC power adapter (C)</p> Signup and view all the answers

    What can protective covers for mobile devices protect against?

    <p>Water damage and physical damage (B)</p> Signup and view all the answers

    What is the primary function of external batteries or portable chargers?

    <p>To provide extra power for mobile devices while on the go (D)</p> Signup and view all the answers

    Where are the LEDs indicating device status commonly located on a laptop?

    <p>Below the display screen or above the keyboard (C)</p> Signup and view all the answers

    What is a defining characteristic of mobile devices compared to laptops?

    <p>They have a touchscreen for input. (A)</p> Signup and view all the answers

    What feature do most docking stations have?

    <p>They allow easy connection and act as a charger. (D)</p> Signup and view all the answers

    How does the CPU architecture of mobile devices differ from that of laptops?

    <p>Mobile devices have a reduced instruction set. (A)</p> Signup and view all the answers

    What is a primary benefit of using headsets or ear buds?

    <p>They allow for hands-free phone conversations. (B)</p> Signup and view all the answers

    Which of the following accessories can be used for processing credit card payments?

    <p>Credit card readers (B)</p> Signup and view all the answers

    Which of the following is a built-in input device typically found on laptops?

    <p>Pointing stick (A)</p> Signup and view all the answers

    What is the primary reason for the increasing popularity of laptops and mobile devices?

    <p>Their size and weight have decreased, enhancing portability. (B)</p> Signup and view all the answers

    What is spear phishing?

    <p>A phishing attack targeted at a specific individual or organization. (C)</p> Signup and view all the answers

    What is a primary characteristic of spam?

    <p>It is unsolicited email often used for advertising. (C)</p> Signup and view all the answers

    Why are organizations encouraged to educate users about phishing?

    <p>Users may frequently be targeted by attackers. (B)</p> Signup and view all the answers

    What should a user do if they are unsure about a request for personal information?

    <p>Contact the organization by mail or phone for verification. (D)</p> Signup and view all the answers

    What usually causes the bulk sending of spam emails?

    <p>Multiple computers infected by viruses or worms. (D)</p> Signup and view all the answers

    What is an effective measure against spam?

    <p>Installing software that automatically filters spam. (D)</p> Signup and view all the answers

    What does social engineering involve?

    <p>Deceiving individuals into revealing sensitive information. (B)</p> Signup and view all the answers

    What is a common misconception about email attachments?

    <p>Attachments from trusted contacts are safe. (B)</p> Signup and view all the answers

    Flashcards

    Laptop

    A compact, portable computer with built-in features like keyboard, touchpad, and webcam.

    Laptop power adapter

    An external power source for laptops, allowing them to run without needing a power outlet. It plugs into the laptop's power port.

    Touchpad

    A small, sensitive surface on a laptop that controls the cursor on the screen. It uses multi-touch gestures for navigation and commands.

    Pointing stick

    A small, stick-like pointing device embedded in the keyboard. It can be used to control the cursor on the screen.

    Signup and view all the flashcards

    LEDs in laptops

    Integrated LEDs on a laptop that indicate the status of different components like power, Wi-Fi, or battery life.

    Signup and view all the flashcards

    Mobile device

    Any hand-held, lightweight device with a touchscreen interface. They use an operating system to run apps, games, and multimedia.

    Signup and view all the flashcards

    Mobile device operating system

    The software that manages the basic functions of a mobile device. It allows users to run applications, access data, and interact with the device.

    Signup and view all the flashcards

    Mobile device CPU architecture

    A specific type of processor in mobile devices that is optimized for low power consumption and efficiency.

    Signup and view all the flashcards

    What are game pads?

    Peripheral devices used for playing video games.

    Signup and view all the flashcards

    What are wearable devices?

    Mobile devices that are worn like clothing or accessories.

    Signup and view all the flashcards

    What are smart watches?

    Watches that combine watch functions with functions of a mobile device.

    Signup and view all the flashcards

    What are fitness monitors?

    Devices worn on the wrist or clipped to clothing, used for tracking activity.

    Signup and view all the flashcards

    What are smart headsets?

    Headsets worn like eye glasses, with a small screen for notifications and communication.

    Signup and view all the flashcards

    What is a key characteristic of laptops and mobile devices?

    Laptop and mobile devices can operate without plugging in.

    Signup and view all the flashcards

    How do mobile devices increase storage?

    Devices that can store more data through memory card readers.

    Signup and view all the flashcards

    What is an example of a category of mobile devices?

    Smartwatches, fitness monitors, and smart headsets are all examples of this category of mobile devices.

    Signup and view all the flashcards

    Spread Zoom

    A feature that allows users to zoom in on objects like photographs, maps, and text by spreading two fingers on the screen.

    Signup and view all the flashcards

    Proximity Sensor

    A sensor that detects proximity, often used to turn off the touchscreen when a phone is brought to the ear and turn it back on when pulled away.

    Signup and view all the flashcards

    Mobile Device Accessories

    Accessories that can enhance the user experience of mobile devices but are not essential for their basic functionality.

    Signup and view all the flashcards

    Protective Covers for Mobile Devices

    Cases and covers that protect mobile devices from physical damage during use or transport.

    Signup and view all the flashcards

    External Batteries/Portable Chargers

    External power sources for mobile devices, such as batteries and chargers, that provide additional power while on the go.

    Signup and view all the flashcards

    Docking Stations

    Devices that allow mobile devices to easily connect to other devices, often also providing charging capabilities.

    Signup and view all the flashcards

    Headsets/Ear Buds

    Audio accessories that allow users to privately listen to audio output, sometimes with a microphone for hands-free calls.

    Signup and view all the flashcards

    Speakers for Mobile Devices

    Audio devices used to amplify sound output from mobile devices, available in various colors, shapes, and sizes.

    Signup and view all the flashcards

    Phishing

    A type of attack that tricks users into providing sensitive information, often impersonating a legitimate organization.

    Signup and view all the flashcards

    Spear Phishing

    A targeted phishing attack aimed at a specific individual or organization.

    Signup and view all the flashcards

    Spam

    Unsolicited email, often used for advertising or spreading malware.

    Signup and view all the flashcards

    Social Engineering

    Using deception and manipulation to gain unauthorized access to systems or information by tricking people into revealing passwords or granting access.

    Signup and view all the flashcards

    Worm

    A harmful program that replicates itself and spreads to other computers.

    Signup and view all the flashcards

    Virus

    A program that can replicate itself and spread to other computers, often requiring user interaction to do so.

    Signup and view all the flashcards

    Antivirus Software

    A type of software designed to detect and remove malware from computers.

    Signup and view all the flashcards

    Email Filtering

    The process of filtering unwanted emails, often preventing spam and malicious content from reaching the recipient's inbox.

    Signup and view all the flashcards

    Antivirus Protection

    Software that actively monitors for and protects against malware threats like viruses, worms, and Trojans.

    Signup and view all the flashcards

    Adware Protection

    Software that detects and blocks programs that display unwanted advertisements on your computer.

    Signup and view all the flashcards

    Phishing Protection

    Software that protects against phishing attacks, which are attempts to steal personal information through fraudulent websites or emails.

    Signup and view all the flashcards

    Spyware Protection

    Software that scans for and removes spyware, which secretly collects information about your computer usage and browsing history.

    Signup and view all the flashcards

    Trusted/Untrusted Source Protection

    Software that warns you about potential threats, such as unsafe programs or websites, before they are installed or accessed.

    Signup and view all the flashcards

    Rogue Antivirus

    A deceptive program that pretends to be legitimate antivirus software but actually installs malware.

    Signup and view all the flashcards

    Computer Security

    The practice of taking preventive measures to protect computer equipment, networks, and data from threats.

    Signup and view all the flashcards

    Malware

    A software that is designed to harm or disrupt computer systems without the user's knowledge or consent.

    Signup and view all the flashcards

    Trojan Horse

    A type of malware disguised as a legitimate program, containing harmful code.

    Signup and view all the flashcards

    Computer Virus

    A type of malware that attaches itself to other files, executing and spreading when the file is accessed.

    Signup and view all the flashcards

    Browser Redirection

    The act of manipulating web browsers to redirect users to unintended websites.

    Signup and view all the flashcards

    Security Policy

    A written document outlining rules and guidelines for maintaining system security within an organization.

    Signup and view all the flashcards

    Study Notes

    Chapter 12: Security

    • This chapter reviews types of attacks threatening computer security.
    • Technicians are responsible for data and equipment security.
    • Understanding physical and data threats is crucial for protection.
    • Physical threats involve stealing, damaging, or destroying equipment (e.g., servers, wiring).
    • Data threats involve removing, corrupting, denying access, or stealing information.

    Types of Security Threats

    • Malware: software designed for malicious activities.
    • Malware is often installed without user knowledge and can change computer configurations or redirect web browsers.
    • Malware can collect information without consent.
    • Virus: a form of malware that spreads via files, transfers, emails, and instant messages.
    • Worm: self-replicating malware damaging networks.
    • Trojan horse: malware disguised as a useful program.

    Phishing

    • Phishing involves deceitful emails, calls, or texts to trick users into providing personal or financial information.
    • Attackers often impersonate legitimate organizations like banks.

    Spam

    • Unsolicited email often used for advertising, harmful links, or malware distribution.
    • Spam is filtered by ISPs and antivirus software.
    • Opening suspicious attachments can spread malware.

    Social Engineering

    • Attackers manipulate individuals to gain access to networks or equipment.
    • Employees should be cautious and verify requests before divulging information.
    • Precautions include not giving out login details, securing computer areas, and verifying the identity of visitors.

    Security Procedures

    • Security policy: a set of objectives ensuring network, data, and system security.
    • Security policies are dynamic, adapting to changing technologies, businesses, and employee needs.
    • Security policy is usually created and managed by organizational management and the IT staff.
    • Usernames and passwords: should adhere to a standard naming convention.
    • Passwords are crucial for security and should not be revealed.

    Protection Against Malicious Software

    • Malware protection programs: include antivirus, anti-spyware, and anti-adware software.
    • Regularly updating malware protection software is essential.
    • Malware programs continuously monitor for malware.
    • Running multiple malware protection programs simultaneously is discouraged.
    • Rogue antivirus programs are malicious software disguised as security tools. Be cautious about downloading and installing unverified programs.
    • Organizations should scan for threats regularly to ensure systems are secure.

    Summary

    • Security threats can come from inside or outside the organization.
    • Viruses, worms, and Trojans can compromise data or physical equipment.
    • Develop security plans to protect data and physical equipment.
    • Keep operating systems and applications up-to-date.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers Chapter 12 of computer security, focusing on various types of attacks and threats. It discusses the importance of securing both physical equipment and data against malware, viruses, worms, and phishing. Test your knowledge on these critical concepts to protect against security breaches.

    More Like This

    Malware Overview and Types
    43 questions

    Malware Overview and Types

    StraightforwardCombinatorics avatar
    StraightforwardCombinatorics
    Security and Ethics Quiz
    13 questions

    Security and Ethics Quiz

    DecentHeliotrope5034 avatar
    DecentHeliotrope5034
    Understanding Malware and Its Types
    10 questions
    Use Quizgecko on...
    Browser
    Browser