What is the term used to describe unwanted software?

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables? PAN

  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies? WAN

  • The Internet is the world’s largest WAN. True

  • Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications? fiber-optic cables

  • Which of the following is an advantage of wired connection? all of the above

  • The most widespread wireless channels for communication networks are microwaves and RF signals. True

  • Microwaves have more carrying capacity than radio waves. True

  • When interference affects a wireless signal, data must be re-transmitted. True

  • Wireless connections use licensed frequencies that are available for public use. False

  • The bandwidth of a channel that carries digital data is usually measured in PAN0.

  • Which type of network topology connects a peripheral device to a host device? PAN1.

  • Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices? PAN2

  • Which type of network topology connects multiple devices to a central device? PAN3

  • Data cannot flow over multiple networks that have different topologies. False

  • On a network, any device that stores or generates data is considered to be a(n) PAN5.

  • Which of the following is an example of a DCE? all of the above

  • Which DCE would you use if you wanted to extend a wired network by adding more ports? PAN7

  • Which type of communication protocol converts data into standard formats that can be used by applications? PAN8

  • The organization that supervises Internet addressing is ARPANET. False

  • Which network tier forms the Internet backbone? WAN0

  • When connecting to the Internet, most Internet users connect to a Tier 1 network. False

  • Networks that form the Internet are maintained by who? WAN2

  • WAN3 technology divides a message into several packets that can be routed independently to their destination.

  • UDP is faster than TCP but does not perform error checking. True

  • On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? WAN5

  • A communication port is a physical circuit through which data flows. False

  • Internet addresses are controlled by which one of the following protocols? WAN7

  • Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want? WAN8

  • A private IP address can be used to send data over the Internet. False

  • What organization is the top-level authority for supervising domain name requests? True0

  • Domain name servers maintain lists of all domain names and their corresponding IP addresses. True

  • A Web site cannot be accessed by its domain name until the name is added to the domain name server lists. True

  • You may be able to bypass DNS outages by changing your DNS server. True

  • Connection speed is technically a measure of capacity. True

  • What type of Internet connection do you have when upload speed differs from download speed? True5

  • Most Internet connections are symmetrical. False

  • Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls. True

  • DSL is an example of what type of Internet access? True8

  • Which type of broadband Internet access involves using cellular data networks? True9

  • Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps? fiber-optic cables0

  • Mobile broadband can be used to access the Internet from a laptop or desktop computer. False

  • fiber-optic cables2 are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.

  • LANs use many of the same network technologies as the Internet. True

  • Most wireless LANs use licensed frequencies that require applying to the FCC for permission. False

  • fiber-optic cables5 LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.

  • You can set up Wi-Fi to use wireless mesh topology OR star topology. True

  • With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance. False

  • Wi-Fi signals may reach up to 300 feet from the router. True

  • When setting up a Wi-Fi network, the router you select should support the fastest device you’ll want to use on the network. True

  • Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. True

  • Network discovery works in the exact same way on all devices. False

  • File sharing poses no real security risks. False

  • Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet? all of the above3

  • You can access FTP servers with a browser. True

  • Dropbox is an example of a file hosting service. True

  • Which file sharing protocol distributes the role of a file server across a collection of dispersed computers? all of the above6

  • Napster spurred the development of sophisticated, distributed protocols such as BitTorrent. True

  • Unit 4: The Web
    1. The Web is synonymous with the Internet. False

    2. The all of the above9 is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.

    3. The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called True0.

    4. HTTP is the markup language used to specify the contents of a Web page. False

    5. What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read? True2

    6. Ted Nelson developed the specifications for URLs, HTML, and HTTP. False

    7. Which early browser was the first to run on multiple computer platforms including Windows? True4

    8. A Web True5 is an Internet-based computer that stores Web site content and accepts requests from browsers.

    9. Web sites can be spread across multiple Web servers. True

    10. In today’s Web, most Web pages have bidirectional links. False

    11. Every Web page has a unique address called a(n) True8.

    12. The file name of a specific Web page always appears first in the URL. False

    13. A URL never contains spaces. True

    14. A link contains the True8 that links to another Web page.

    15. URLs contain a domain name. True

    16. What is the term used for when a link leads to a Web page that no longer exists? True3

    17. Which of the following would NOT be considered an essential element of a browser? True4

    18. You can use multiple browsers on a device. True

    19. If you want to change your default browser, you need to delete the browsers that you no longer want to use. False

    20. In a browser, True7 link to pages that you use frequently.

    21. If you allow your browser to store passwords, you non longer need to worry about security for those passwords. False

    22. Which of the following is a function of the browser cache?
      True9

    23. Files can remain in the Web cache for days or weeks. True

    24. It is not possible to delete the contents of your browser cache. False

    25. Browser cache is another term for browser History list. False

    26. If your device will not display a PDF in your browser, you may need to install a browser True3.

    27. A browser True4 adds features to a browser.

    28. When were the original HTML specifications developed by Tim Berners-Lee? True5

    29. HTML is the only markup language used on the Web. False

    30. Which of the following is a markup language? True7

    31. In an HTML document, most tags are inserted as pairs. True

    32. Which of the following file extensions indicates the file is an HTML document? True7

    33. HTML tags are instructions for a browser. True

    34. Which of the following is NOT used to create or edit HTML documents? False1

    35. You can create HTML documents with simple text editors such as Notepad or TextEdit. True

    36. An HTML document consists of three sections: the head, the body, and the content. False

    37. Which HTML tag designates links to other Web pages? False4

    38. An HTML document begins with the DOCTYPE and html declarations. False

    39. The Head section of an HTML document contains text and links to images. False

    40. What does the HTML tag False7 designate in an HTML document? False8

    41. If you wanted to set the text in a section of your HTML document to italics, what tag would you use? False9

    42. If you wanted to turn bold off for the remainder of the text in an HTML document, what tag would you use? PAN00

    43. Using just HTML and CSS, Web designers can create dynamic Web pages. False

    44. Which of the following is a common use of server-side scripting? PAN02

    45. A(n) PAN03 is a company that provides space on a server to house Web pages.

    46. You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents. True

    47. Which of the following is NOT an HTTP method? PAN05

    48. Which HTTP method does a browser use when you upload files to a specific Web address? PAN06

    49. HTTP uses port 20 for communications between a client device and a server. False

    50. A 404 status code indicates that the resource that your browser requested does not exist. True

    51. HTTP is considered to be a(n) PAN09 protocol.

    52. Cookies can be stored on desktop and laptop computers but not smartphones or tablet computers. False

    53. Which of the following is data that would NOT be found in a cookie? PAN11

    54. Session cookies are stored on a disk or other permanent storage medium. False

    55. A PAN13 cookie is set by a site other than the one you connected to.

    56. If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser? PAN14

    57. Public key encryption requires one key to encrypt data, but a different key to decrypt it. True

    58. A(n) PAN16 is a program designed to help people locate information on the Web by formulating simple queries.

    59. Which is a component of a search engine? all of the above

    60. Web crawlers gather material from the invisible Web. False

    61. Which of the following is the technique for improving the ranking and visibility of a Web site? PAN19

    62. In the list below, which one is NOT a search operator? PAN20

    63. Search engines will keep a record of your search history. True

    64. Your search history is the same as your browser history. False

    65. Search engines do not allow users to view or change their search history information. False

    Unit 7: Digital Security
    1. Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers. PAN24

    2. An original message or file that has not yet been encrypted is referred to as ciphertext. False

    3. A cryptographic PAN26 is a word, number, or phrase that must be known to encrypt or decrypt data.

    4. There are various encryption methods, but PAN27 is the encryption standard currently used worldwide.

    5. A cryptographic PAN28 is a procedure for encryption or decryption.

    6. Which of the following is not an example of an authentication protocol? all of the above

    7. The single most effective security measure for digital devices is to password protect access to them. True

    8. Passwords used as encryption PAN31 help to make hijacked data unusable.

    9. Android devices automatically encrypt data stored on the device when a user activates the login password. False

    10. It is not possible to encrypt a Windows hard drive volume. False

    11. OS X devices include a utility that automatically encrypts data stored locally. False

    12. A(n) PAN35 password is difficult to hack.

    13. Conventional wisdom tells us that strong passwords are at least PAN36 characters in length and include one or more uppercase letters, numbers, and symbols.

    14. Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols? PAN37

    15. Which of the following is not a characteristic of a weak password?
      PAN38

    16. Brute force attacks methodically try every possible password until the correct one is found. True

    17. Password PAN40 is a measure in bits of a password's unpredictability.

    18. Password entropy is a measure in PAN41 of a password's unpredictability.

    19. If you want to store passwords on your digital device, make sure to PAN42 the file in which they are stored.

    20. If you feel more secure with a totally random and unique password for each of your logins, then a(n) PAN43 is an excellent option.

    21. The core function of a password manager is to store user IDs with their corresponding PAN44.

    22. Password managers can generate unique passwords that have very good entropy. True

    23. Password managers store passwords in a(n) PAN46 file.

    24. If you use a password manager, what do you as the user need to remember? PAN47

    25. A password manager can store passwords in an encrypted file located at which of the following storage locations? all of the above

    26. PAN49 refers to any computer program designed to surreptitiously enter a digital device.

    27. The action carried out by malware code is referred to as a(n) PAN50.

    28. Common classifications of PAN51 include viruses, worms, and trojans.

    29. A computer PAN52 is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

    30. In addition to replicating itself, a virus self-distributing. False

    31. Viruses spread themselves from one device to another. False

    32. PAN55 is the process of modifying an executable file or data stream by adding additional commands.

    33. What is the process called when an app from a source other than an official app store is installed on a device? PAN56

    34. Any code that is designed to hide the existence of processes and privileges is referred to as a(n) PAN57.

    35. A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves. True

    36. A computer PAN59 is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim’s device.

    37. Which of the following is not a characteristic of a computer worm?
      PAN60

    38. Stuxnet is a notorious computer PAN59.

    39. Similar to a worm, a trojan is not designed to spread itself to other devices. False

    40. Most trojans are not designed to replicate themselves. True

    41. A(n) PAN64 is a computer program that seems to perform one function while actually doing something else.

    42. PAN65 are standalone programs that masquerade as useful utilities or applications.

    43. Trojans depend on PAN66 to spread.

    44. A(n) PAN67 is designed to deliver malicious code into a device.

    45. Any data entering a digital device could be malware. True

    46. The best defense against malware is PAN69.

    47. A virus PAN70 is a section of program code that contains a unique series of instructions known to be part of a malware exploit.

    48. Antivirus software can use techniques called PAN71 to detect malware by analyzing the characteristics and behavior of suspicious files.

    49. One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) PAN72.

    50. Heuristics may produce false positives that mistakenly identify a legitimate file as malware. True

    51. When antivirus software detects malware, which of the following would not be a course of action you could take?
      PAN74

    52. Once you have installed antivirus software, you don't typically need to keep it running full time in the background. False

    53. A virus PAN76 usually arrives as an email message that contains warnings about a supposedly new virus.

    54. A(n) PAN77 takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

    55. Which of the following sequence of events best describes an online intrusion?
      PAN78

    56. A PAN79 is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

    57. A(n) PAN80 is an undocumented method of accessing a digital device.

    58. RATs can be used to create a backdoor to a victim’s device that takes control of the device’s camera. True

    59. If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utilities is turned off. False

    60. Which type of device is the top target for ransomware? PAN83

    61. PAN84 locks a device and then requests payment for an unlocking code.

    62. Hackers who gain control over several computers can organize them into a client-server network known as a(n) PAN85.

    63. A botnet has a server that is controlled by hackers. True

    64. True7 can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

    65. Correctly installed antivirus software will prevent all intrusions. False

    66. Antivirus software cannot be expected to block threats that do not arrive in the form of malware. True

    67. A(n) PAN90 attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

    68. PAN91 software shields certain applications against behaviors commonly exhibited by intrusions.

    69. Hackers can use ports to communicate with devices in botnets. True

    70. A(n) PAN93 pings a packet of data to a port in order to see if that port is open or not.

    71. A network utility called PAN94 produces a detailed list of open ports on a device.

    72. A(n) PAN95 is a device or software that is designed to block unauthorized access while allowing authorized communications.

    73. Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? all of the above

    74. Any software that secretly gathers personal information without the victim’s knowledge is classified as PAN97.

    75. Which of the following would be considered spyware? PAN98

    76. MITM attacks include which of the following? all of the above

    77. The objective of a MITM attack is for a third party to block communications between two entities. False

    78. A(n) WAN01 is a LAN server that is designed to look like a legitimate Wi-Fi hotspot.

    79. To establish a(n) WAN01, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

    80. WAN03 changes an originating address or a destination address to redirect the flow of data between two parties.

    81. If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. True

    82. The current method of encrypting communication between a client and a server depends on a security protocol called WAN05.

    83. WAN06 is a 64-bit number that uniquely identifies a cellular device.

    84. IMSI catchers are operated by cellular service companies. False

    85. WAN08 is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

    86. WAN09 is a term for a person who devises and carries out a scam in order to accomplish a goal.

    87. Social engineering attacks prey on human vulnerabilities. True

    88. A social engineering scam called WAN11 is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.

    89. WAN12 is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

    90. Spam sent by scammers often uses spoofed email addresses. True

    91. Most mass-mailing databases are legitimately compiled from customer lists. False

    92. Spam accounts for approximately WAN15 of all email.

    93. The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet. False

    94. WAN17 is a term describing spam that uses a false pretext to trick victims into participating.

    95. Most ISPs and email services do not use filtering techniques to block spam. False

    96. A spam WAN19 uses a set of rules to examine email messages and determine which are spam.

    97. Which of the following is not a type of spam filter? WAN20

    98. Blacklist and header filtering is usually performed by email clients and Webmail services. False

    99. WAN22 is an email scam that masquerades as a message from a legitimate source.

    100. WAN23 redirects Web site traffic to fraudulent Web sites.

    101. Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software. False.

    102. WAN25 is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

    103. Microsoft uses a service called Safe Browsing to alert users about sites to avoid. False

    104. A WAN27 exploit usually begins with a virus warning and an offer to disinfect the infected device.

    105. The most common types of PUPs and PUAs are toolbars and alternative browsers. True

    106. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? WAN29

      What is the term used to describe unwanted software that installs?

      Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software.

      What is an anti malware software?

      An antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. Malicious software - known as malware - is code that can harm your computers and laptops, and the data on them.

      Is a general term used for describing software that violates a user's personal security?

      Malware. Malware is a general term for any type of intrusive computer software with malicious intent against the user.

      What is the term used to describe software that is installed on a computer which allows the attacker to return at a later time and bypass security settings?

      Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.