Cybersecurity Essentials Quiz
28 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the purposes cookies serve on websites?

  • Store user names or passwords (correct)
  • Limit website traffic
  • Display ads only
  • Increase loading speed

Phishing scams utilize official-looking messages to gather personal information.

True (A)

What is the main function of spyware?

To collect information about the user without their knowledge.

______ is defined as gaining unauthorized access by taking advantage of human trust.

<p>Social engineering</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Phishing = Scam to obtain personal information Clickjacking = Malicious program hidden in a clickable object Adware = Program displaying advertisements Content Filtering = Restricting access to certain materials</p> Signup and view all the answers

What is a botnet?

<p>A group of compromised computers or devices connected to a network (C)</p> Signup and view all the answers

A worm is a type of program that does not replicate itself.

<p>False (B)</p> Signup and view all the answers

What is a cybercrime?

<p>An online illegal act (D)</p> Signup and view all the answers

What do access controls define?

<p>Who can access a computer, device, or network, when they can access it, and what actions they can take.</p> Signup and view all the answers

Which of the following is a method of biometric authentication?

<p>Fingerprints (D)</p> Signup and view all the answers

Malware always requires user knowledge and permission to operate.

<p>False (B)</p> Signup and view all the answers

A device that authenticates identity using personal characteristics is called a __________.

<p>biometric device</p> Signup and view all the answers

Digital forensics is primarily used for personal data recovery.

<p>False (B)</p> Signup and view all the answers

Name one type of malware that collects user information secretly.

<p>Spyware</p> Signup and view all the answers

What is the purpose of encryption?

<p>To convert readable data into encoded characters to prevent unauthorized access.</p> Signup and view all the answers

Which of the following is NOT a method of authentication?

<p>Firewall (B)</p> Signup and view all the answers

A __________ is a program that blocks access to a device until a payment is made.

<p>Ransomware</p> Signup and view all the answers

A __________ verification system uses two different methods to confirm a user's identity.

<p>two-step</p> Signup and view all the answers

Match the types of malware with their descriptions:

<p>Adware = Displays online advertisements Trojan horse = Hides within a legitimate program Virus = Infects a computer by altering its operations Rootkit = Allows remote control of a device</p> Signup and view all the answers

A Distributed DoS attack uses multiple compromised devices to overwhelm a target.

<p>True (A)</p> Signup and view all the answers

Which of the following is NOT a type of malware?

<p>Firewall (D)</p> Signup and view all the answers

Match the following biometric systems to their descriptions:

<p>Fingerprint reader = Identifies users by scanning their fingerprints Face recognition system = Identifies users through facial features Iris recognition system = Identifies users by analyzing their iris patterns Voice verification system = Identifies users via their voice patterns</p> Signup and view all the answers

What is the purpose of an audit trail in access controls?

<p>To record both successful and unsuccessful access attempts.</p> Signup and view all the answers

Internet-transmitted information carries a lower security risk compared to information stored on premises.

<p>False (B)</p> Signup and view all the answers

Which area does NOT typically use digital forensics?

<p>Retail sales (D)</p> Signup and view all the answers

In computer security, what does the term 'malware' refer to?

<p>Malicious software</p> Signup and view all the answers

A cookie is used to store large amounts of personal data on a web server.

<p>False (B)</p> Signup and view all the answers

What is information privacy?

<p>The right of individuals and companies to restrict the collection and use of their information.</p> Signup and view all the answers

Flashcards

Digital Security Risk

Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.

Cybercrime

An online or Internet-based illegal act.

Malware

Programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.

Adware

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services.

Signup and view all the flashcards

Ransomware

A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money.

Signup and view all the flashcards

Rootkit

A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.

Signup and view all the flashcards

Spyware

A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Signup and view all the flashcards

Trojan horse

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

Signup and view all the flashcards

Botnet

A group of compromised computers or mobile devices connected to a network.

Signup and view all the flashcards

Zombie

A compromised computer or device in a botnet.

Signup and view all the flashcards

Denial of Service (DoS) Attack

An attack that overwhelms a server with requests, making it impossible for legitimate users to access it.

Signup and view all the flashcards

Distributed Denial of Service (DDoS) Attack

A DoS attack that uses a network of compromised computers.

Signup and view all the flashcards

Backdoor

A program or set of instructions that allows unauthorized access to a system.

Signup and view all the flashcards

Spoofing

A technique to disguise a transmission's origin, making it appear legitimate.

Signup and view all the flashcards

Firewall

Hardware or software that protects a network from unauthorized access.

Signup and view all the flashcards

Passphrase

A combination of words (often with mixed capitalization and punctuation) used for authentication.

Signup and view all the flashcards

Fingerprint reader

A method of unlocking a device using a unique scan of the user's finger.

Signup and view all the flashcards

Face recognition system

A system that verifies your identity by recognizing your face.

Signup and view all the flashcards

Hand geometry system

A security system that identifies individuals based on the unique shape and size of their hand.

Signup and view all the flashcards

Iris recognition system

A system that uses a scan of your iris to verify your identity.

Signup and view all the flashcards

Signature verification system

A security measure that validates a user's authenticity by comparing a signature with a stored signature.

Signup and view all the flashcards

Voice verification system

A system that verifies your identity by comparing your voice with a stored voice sample.

Signup and view all the flashcards

Two-step verification

A security measure that requires two distinct forms of authentication to confirm a user's identity.

Signup and view all the flashcards

Digital forensics

The process of collecting and analyzing digital evidence from computers and networks.

Signup and view all the flashcards

What is phishing?

A scam that uses official-looking messages to trick you into giving away your personal or financial information.

Signup and view all the flashcards

What is clickjacking?

A malicious program hidden within a website, used to trick you into clicking on something harmful.

Signup and view all the flashcards

What is spyware?

Software secretly installed on your device without your knowledge, collecting your information and sending it to someone else.

Signup and view all the flashcards

What is adware?

A program that shows advertisements on your computer, often without your permission.

Signup and view all the flashcards

What is social engineering?

Gaining unauthorized access to your information by exploiting your trust and naivety.

Signup and view all the flashcards

Study Notes

Digital Security Risks

  • A digital security risk is any event or action that could harm computer or mobile device hardware, software, data, information, or processing capabilities.
  • Computer crime is any illegal act involving computers or related devices.
  • Cybercrime is an online or internet-based illegal act.

Internet and Network Attacks

  • Information transmitted over networks carries a higher security risk than information stored on premises.
  • Malware is malicious software that operates without user knowledge and alters computer/mobile device operation.

Common Malware Types

  • Adware: Displays online ads on webpages, emails, or other internet services.
  • Ransomware: Blocks or limits access to computers, phones, or files until a payment is made.
  • Rootkit: Hides in a device and allows remote control.
  • Spyware: Secretly collects user information and sends it to an outside source.
  • Trojan horse: Appears legitimate but contains malicious code. Does not replicate itself.
  • Virus: Damages a computer or device by negatively altering operations without permission.
  • Worm: Replicates itself repeatedly, consuming resources and potentially shutting down systems.

Internet and Network Attacks (Continued):

  • A botnet is a group of compromised computers/devices in a network.
  • A zombie is a compromised computer/device.
  • A Denial of Service (DoS) attack disrupts computer access to internet services. A Distributed DoS (DDoS) attack is a coordinated DoS.
  • A backdoor is a program that bypasses security controls.
  • Spoofing disguises a network/internet transmission to appear legitimate.

Internet and Network Attacks (Continued):

  • A firewall is hardware or software that protects a network from intrusion.

Unauthorized Access and Use

  • Access controls determine who can access a system, when, and what actions are allowed.
  • A system should maintain an audit trail documenting successful and failed access attempts.
  • Examples of access controls include: username, password.

Unauthorized Access and Use (Continued)

  • A passphrase is a private combination of words, often containing mixed capitalization and punctuation. Used with usernames for access.
  • A PIN (personal identification number), sometimes called a passcode, is a numeric password. Assigned by companies or users.
  • A possessed object (e.g., token) is required for access to the system.
  • Biometric devices use physical or behavioral characteristics to verify identity.

Unauthorized Access and Use (Continued):

  • Fingerprint readers, face recognition systems, hand geometry systems, iris recognition systems, and signature/voice verification systems are examples of biometric verification methods.
  • Two-step verification uses two separate methods for user identity verification.

Unauthorized Access and Use (Continued):

  • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.
  • Digital forensics is used in many fields, such as law enforcement, criminal prosecutions, military intelligence, insurance, and information security.

Information Theft

  • Information theft occurs when someone steals personal or confidential information.
  • Encryption converts readable data into encoded characters, preventing unauthorized access.

Ethics and Society

  • Technology ethics are moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
  • Information accuracy is a concern, as not all online information is correct.

Information Privacy

  • Information privacy is the right of individuals and companies to control the collection, use, and sharing of information about them.
  • Huge databases store large amounts of online data.
  • Websites often collect data to customize ads and send personalized emails.
  • Some employers monitor computer and email use.

Information Privacy (Continued)

  • A cookie is a small text file that a web server stores on a computer. It's used for personalization, storing user information, assisting in online shopping, tracking site visits, and targeting advertisements.

Information Privacy (Continued)

  • Phishing is a scam where a perpetrator sends official-looking messages to obtain personal or financial information.
  • Clickjacking involves malicious code embedded in a website's clickable elements.

Information Privacy (Continued)

  • Spyware secretly collects user information from computers/mobile devices and sends it to an outside source.
  • Adware uses banners, pop-ups, or pop-unders to display online advertisements.

Information Privacy (Continued)

  • Social engineering involves gaining unauthorized access by exploiting trust and naivety.
  • Federal and state laws regulate personal data storage and disclosure due to privacy concerns.

Information Privacy (Continued)

  • Content filtering restricts access to specific materials.
  • Web filtering software restricts access to certain websites.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Digital Security ICT PDF

Description

Test your knowledge on cybersecurity concepts, including the functions of cookies, types of malware, and methods of authentication. This quiz covers essential topics related to online security measures and cyber threats. Get ready to challenge yourself and learn more about protecting digital information.

More Like This

Computer Security Measures
18 questions
Cybersecurity Principles Quiz
13 questions
Cybersecurity: Phishing and Malware Types
40 questions
Cybersecurity: Phishing and Malware
16 questions

Cybersecurity: Phishing and Malware

UserReplaceableOpossum5257 avatar
UserReplaceableOpossum5257
Use Quizgecko on...
Browser
Browser