ログイン

lesson 3

lesson 3
70問 • 1年前
  • ユーザ名非公開
  • 通報

    問題一覧

  • 1

    is a term used to describe actions taken by someone to gain unauthorized access to a computer.

    hacking

  • 2

    The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

    hacking

  • 3

    The process by which cyber criminals gain access to your computer.

    hacking

  • 4

    Find weaknesses or pre-existing bugs in your security settings and exploit them in order to access your information.

    hacking

  • 5

    ___providing a back door for hackers to enter and search for your information.

    trojan horse

  • 6

    Install a Trojan horse, providing a back door for hackers to enter and search for your information.

    hacking

  • 7

    is one of the more common ways to infiltrate or damage your computer.

    malware

  • 8

    infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

    malware

  • 9

    Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information.

    malware

  • 10

    Reformat the hard drive of your computer causing you to lose all your information.

    malware

  • 11

    Alter or delete files.

    malware

  • 12

    Steal sensitive information.

    malware

  • 13

    Send emails on your behalf.

    malware

  • 14

    Take control of your computer and all the software running on it.

    malware

  • 15

    is a common type of online fraud.

    pharming

  • 16

    A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

    pharming

  • 17

    actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

    pharming

  • 18

    is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.

    phishing

  • 19

    Fake emails, text messages and websites created to look like they're from authentic companies.

    phishing

  • 20

    They're sent by criminals to steal personal and financial information from you.

    phishing

  • 21

    This is also known as "spoofing".

    phishing

  • 22

    Trick you into giving them information by asking you to update, validate or confirm your account.

    phishing

  • 23

    It is often presented in a manner than seems official and intimidating, to encourage you to take action.

    phishing

  • 24

    Provides cyber criminals with your username and passwords so that they can access your accounts your online bank account, shopping accounts and steal your credit card numbers.

    phishing

  • 25

    Is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

    ransomware

  • 26

    The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.

    ransomware

  • 27

    common types of ransomware:

    1. Lockscreen ransomware 2. Encryption ransomware

  • 28

    displays an image that prevents you from accessing your computer

    lockscreen ransomware

  • 29

    encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

    encryption ransomware

  • 30

    will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access.

    ransomware

  • 31

    the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.

    ransomware

  • 32

    is one of the more common methods of both sending information out and collecting it from unsuspecting people.

    spam

  • 33

    The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

    spam

  • 34

    Annoy you with unwanted junk mail.

    spam

  • 35

    Create a burden for communications service providers and businesses to filter electronic messages.

    spam

  • 36

    Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.

    spam

  • 37

    Provide a vehicle for malware, scams, fraud and threats to your privacy.

    spam

  • 38

    often used by third parties to infiltrate your computer.

    Spy & adware

  • 39

    Software that collects personal information about you without you knowing.

    Spyware & Adware

  • 40

    They often come in the form of a 'free' download and are installed automatically with or without your consent.

    Spyware & Adware

  • 41

    These are difficult to remove and can infect your computer

    Spyware & Adware

  • 42

    Collect information about you without you knowing about it and give it to third parties.

    Spyware & Adware

  • 43

    Send your usernames, passwords, surfing habits, list of applications you've downloaded,

    Spyware & Adware

  • 44

    Change the way your computer runs without your knowledge.

    Spyware & Adware

  • 45

    Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

    Spyware & Adware

  • 46

    A malicious program that is disguised as, or embedded within, legitimate software.

    trojan horses

  • 47

    It is an executable file that will install itself and run automatically once it's downloaded.

    trojan horses

  • 48

    Delete your files.

    trojan horses

  • 49

    Use your computer to hack other computers.

    trojan horses

  • 50

    Watch you through your web cam.

    trojan horses

  • 51

    Log your key strokes such as a credit card number you entered in an online purchase.

    trojan horses

  • 52

    Record usernames, passwords and other personal information.

    trojan horses

  • 53

    Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

    virus

  • 54

    Send spam.

    virus

  • 55

    Provide criminals with access to your computer and contact lists.

    virus

  • 56

    Scan and find personal information like passwords on your computer.

    virus

  • 57

    Hijack your web browser.

    virus

  • 58

    Disable your security settings.

    virus

  • 59

    Display unwanted ads.

    virus

  • 60

    When a program is running, it could infiltrate your hard drive and also spread to USB keys and external hard drives.

    virus

  • 61

    Any attachment you create using this program and send to someone else could also infect them

    virus

  • 62

    is another method used by cyber criminals to capture personal information.

    Wi-Fi Eavesdropping

  • 63

    Virtual "listening in" on information that's shared over an unsecure (not encrypted) WiFi network.

    Wi-Fi Eavesdropping

  • 64

    Potentially access your computer with the right equipment.

    Wi-Fi Eavesdropping

  • 65

    Steal your personal information including logins and passwords.

    Wi-Fi Eavesdropping

  • 66

    are a common threat to computers and the Internet as a whole.

    worms

  • 67

    goes to work on its own without attaching itself to files or programs.

    worms

  • 68

    It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network

    worms

  • 69

    Spread to everyone in your contact list.

    worms

  • 70

    Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.

    worms

  • MATH finals Module 8 Quantifiers and Negations

    MATH finals Module 8 Quantifiers and Negations

    ユーザ名非公開 · 7問 · 2年前

    MATH finals Module 8 Quantifiers and Negations

    MATH finals Module 8 Quantifiers and Negations

    7問 • 2年前
    ユーザ名非公開

    STS prelim module 1 (ancient) part 1

    STS prelim module 1 (ancient) part 1

    ユーザ名非公開 · 100問 · 2年前

    STS prelim module 1 (ancient) part 1

    STS prelim module 1 (ancient) part 1

    100問 • 2年前
    ユーザ名非公開

    STS prelim module 1 (ancient) part 2

    STS prelim module 1 (ancient) part 2

    ユーザ名非公開 · 26問 · 2年前

    STS prelim module 1 (ancient) part 2

    STS prelim module 1 (ancient) part 2

    26問 • 2年前
    ユーザ名非公開

    STS prelim module 1 (medieval)

    STS prelim module 1 (medieval)

    ユーザ名非公開 · 6問 · 2年前

    STS prelim module 1 (medieval)

    STS prelim module 1 (medieval)

    6問 • 2年前
    ユーザ名非公開

    STS prelim module 1 (modern)

    STS prelim module 1 (modern)

    ユーザ名非公開 · 20問 · 2年前

    STS prelim module 1 (modern)

    STS prelim module 1 (modern)

    20問 • 2年前
    ユーザ名非公開

    STS prelim phil

    STS prelim phil

    ユーザ名非公開 · 7問 · 2年前

    STS prelim phil

    STS prelim phil

    7問 • 2年前
    ユーザ名非公開

    Contemp Module 1 Prelim

    Contemp Module 1 Prelim

    ユーザ名非公開 · 38問 · 2年前

    Contemp Module 1 Prelim

    Contemp Module 1 Prelim

    38問 • 2年前
    ユーザ名非公開

    Lesson 1 Part 1

    Lesson 1 Part 1

    ユーザ名非公開 · 24問 · 2年前

    Lesson 1 Part 1

    Lesson 1 Part 1

    24問 • 2年前
    ユーザ名非公開

    Lesson 1 Part 2

    Lesson 1 Part 2

    ユーザ名非公開 · 29問 · 2年前

    Lesson 1 Part 2

    Lesson 1 Part 2

    29問 • 2年前
    ユーザ名非公開

    lesson2

    lesson2

    ユーザ名非公開 · 7問 · 2年前

    lesson2

    lesson2

    7問 • 2年前
    ユーザ名非公開

    environmental factors

    environmental factors

    ユーザ名非公開 · 5問 · 2年前

    environmental factors

    environmental factors

    5問 • 2年前
    ユーザ名非公開

    organizational factor

    organizational factor

    ユーザ名非公開 · 5問 · 2年前

    organizational factor

    organizational factor

    5問 • 2年前
    ユーザ名非公開

    M1 Lesson 1

    M1 Lesson 1

    ユーザ名非公開 · 17問 · 2年前

    M1 Lesson 1

    M1 Lesson 1

    17問 • 2年前
    ユーザ名非公開

    M1 Lesson 2 Functions of Art

    M1 Lesson 2 Functions of Art

    ユーザ名非公開 · 31問 · 2年前

    M1 Lesson 2 Functions of Art

    M1 Lesson 2 Functions of Art

    31問 • 2年前
    ユーザ名非公開

    Yunit 2

    Yunit 2

    ユーザ名非公開 · 39問 · 2年前

    Yunit 2

    Yunit 2

    39問 • 2年前
    ユーザ名非公開

    retorika intro

    retorika intro

    ユーザ名非公開 · 44問 · 2年前

    retorika intro

    retorika intro

    44問 • 2年前
    ユーザ名非公開

    Module 1

    Module 1

    ユーザ名非公開 · 14問 · 2年前

    Module 1

    Module 1

    14問 • 2年前
    ユーザ名非公開

    Ancient World

    Ancient World

    ユーザ名非公開 · 100問 · 2年前

    Ancient World

    Ancient World

    100問 • 2年前
    ユーザ名非公開

    medieval/middle age

    medieval/middle age

    ユーザ名非公開 · 14問 · 2年前

    medieval/middle age

    medieval/middle age

    14問 • 2年前
    ユーザ名非公開

    modern ages

    modern ages

    ユーザ名非公開 · 27問 · 2年前

    modern ages

    modern ages

    27問 • 2年前
    ユーザ名非公開

    into

    into

    ユーザ名非公開 · 23問 · 2年前

    into

    into

    23問 • 2年前
    ユーザ名非公開

    globalization 1st part

    globalization 1st part

    ユーザ名非公開 · 24問 · 2年前

    globalization 1st part

    globalization 1st part

    24問 • 2年前
    ユーザ名非公開

    globalization pt2

    globalization pt2

    ユーザ名非公開 · 33問 · 2年前

    globalization pt2

    globalization pt2

    33問 • 2年前
    ユーザ名非公開

    globalization 2nd part

    globalization 2nd part

    ユーザ名非公開 · 35問 · 1年前

    globalization 2nd part

    globalization 2nd part

    35問 • 1年前
    ユーザ名非公開

    Philippines

    Philippines

    ユーザ名非公開 · 31問 · 1年前

    Philippines

    Philippines

    31問 • 1年前
    ユーザ名非公開

    Philippines inventors

    Philippines inventors

    ユーザ名非公開 · 7問 · 1年前

    Philippines inventors

    Philippines inventors

    7問 • 1年前
    ユーザ名非公開

    Yunit 3

    Yunit 3

    ユーザ名非公開 · 25問 · 1年前

    Yunit 3

    Yunit 3

    25問 • 1年前
    ユーザ名非公開

    Yunit 3 part 2

    Yunit 3 part 2

    ユーザ名非公開 · 57問 · 1年前

    Yunit 3 part 2

    Yunit 3 part 2

    57問 • 1年前
    ユーザ名非公開

    structures of globalization

    structures of globalization

    ユーザ名非公開 · 93問 · 1年前

    structures of globalization

    structures of globalization

    93問 • 1年前
    ユーザ名非公開

    SCIENCETECHNOLOGY ANDNATIONBUILDING

    SCIENCETECHNOLOGY ANDNATIONBUILDING

    ユーザ名非公開 · 64問 · 1年前

    SCIENCETECHNOLOGY ANDNATIONBUILDING

    SCIENCETECHNOLOGY ANDNATIONBUILDING

    64問 • 1年前
    ユーザ名非公開

    Filipino inventions (video)

    Filipino inventions (video)

    ユーザ名非公開 · 15問 · 1年前

    Filipino inventions (video)

    Filipino inventions (video)

    15問 • 1年前
    ユーザ名非公開

    Government Policies on Science and Technology

    Government Policies on Science and Technology

    ユーザ名非公開 · 31問 · 1年前

    Government Policies on Science and Technology

    Government Policies on Science and Technology

    31問 • 1年前
    ユーザ名非公開

    match match

    match match

    ユーザ名非公開 · 25問 · 1年前

    match match

    match match

    25問 • 1年前
    ユーザ名非公開

    Yunit 1

    Yunit 1

    ユーザ名非公開 · 34問 · 1年前

    Yunit 1

    Yunit 1

    34問 • 1年前
    ユーザ名非公開

    Yunit 1 (quote)

    Yunit 1 (quote)

    ユーザ名非公開 · 7問 · 1年前

    Yunit 1 (quote)

    Yunit 1 (quote)

    7問 • 1年前
    ユーザ名非公開

    lesson 3

    lesson 3

    ユーザ名非公開 · 30問 · 1年前

    lesson 3

    lesson 3

    30問 • 1年前
    ユーザ名非公開

    lesson 5

    lesson 5

    ユーザ名非公開 · 17問 · 1年前

    lesson 5

    lesson 5

    17問 • 1年前
    ユーザ名非公開

    lesson 4

    lesson 4

    ユーザ名非公開 · 14問 · 1年前

    lesson 4

    lesson 4

    14問 • 1年前
    ユーザ名非公開

    Chapter 1 part 1

    Chapter 1 part 1

    ユーザ名非公開 · 99問 · 1年前

    Chapter 1 part 1

    Chapter 1 part 1

    99問 • 1年前
    ユーザ名非公開

    Chapter 1 part 2

    Chapter 1 part 2

    ユーザ名非公開 · 46問 · 1年前

    Chapter 1 part 2

    Chapter 1 part 2

    46問 • 1年前
    ユーザ名非公開

    chapter 1 tanong tanong

    chapter 1 tanong tanong

    ユーザ名非公開 · 11問 · 1年前

    chapter 1 tanong tanong

    chapter 1 tanong tanong

    11問 • 1年前
    ユーザ名非公開

    United Nations Organization (UNO)

    United Nations Organization (UNO)

    ユーザ名非公開 · 76問 · 1年前

    United Nations Organization (UNO)

    United Nations Organization (UNO)

    76問 • 1年前
    ユーザ名非公開

    mga mahirap

    mga mahirap

    ユーザ名非公開 · 8問 · 1年前

    mga mahirap

    mga mahirap

    8問 • 1年前
    ユーザ名非公開

    physical fitness and wellness

    physical fitness and wellness

    ユーザ名非公開 · 40問 · 1年前

    physical fitness and wellness

    physical fitness and wellness

    40問 • 1年前
    ユーザ名非公開

    final ppt

    final ppt

    ユーザ名非公開 · 60問 · 1年前

    final ppt

    final ppt

    60問 • 1年前
    ユーザ名非公開

    fundamental body movements

    fundamental body movements

    ユーザ名非公開 · 43問 · 1年前

    fundamental body movements

    fundamental body movements

    43問 • 1年前
    ユーザ名非公開

    axis of motion

    axis of motion

    ユーザ名非公開 · 8問 · 1年前

    axis of motion

    axis of motion

    8問 • 1年前
    ユーザ名非公開

    north and south divide

    north and south divide

    ユーザ名非公開 · 25問 · 1年前

    north and south divide

    north and south divide

    25問 • 1年前
    ユーザ名非公開

    asian regionalism

    asian regionalism

    ユーザ名非公開 · 23問 · 1年前

    asian regionalism

    asian regionalism

    23問 • 1年前
    ユーザ名非公開

    GLOBALIZATION OF RELIGION

    GLOBALIZATION OF RELIGION

    ユーザ名非公開 · 11問 · 1年前

    GLOBALIZATION OF RELIGION

    GLOBALIZATION OF RELIGION

    11問 • 1年前
    ユーザ名非公開

    Global Media Culture

    Global Media Culture

    ユーザ名非公開 · 25問 · 1年前

    Global Media Culture

    Global Media Culture

    25問 • 1年前
    ユーザ名非公開

    asian regionalism (book)

    asian regionalism (book)

    ユーザ名非公開 · 22問 · 1年前

    asian regionalism (book)

    asian regionalism (book)

    22問 • 1年前
    ユーザ名非公開

    Global Culture and Media (book)

    Global Culture and Media (book)

    ユーザ名非公開 · 14問 · 1年前

    Global Culture and Media (book)

    Global Culture and Media (book)

    14問 • 1年前
    ユーザ名非公開

    lesson 1 ang retorika at diskurso & lesson 2

    lesson 1 ang retorika at diskurso & lesson 2

    ユーザ名非公開 · 50問 · 1年前

    lesson 1 ang retorika at diskurso & lesson 2

    lesson 1 ang retorika at diskurso & lesson 2

    50問 • 1年前
    ユーザ名非公開

    lesson 3 ORGANISASYON NG DISKURSONGPASALITA AT PASULAT

    lesson 3 ORGANISASYON NG DISKURSONGPASALITA AT PASULAT

    ユーザ名非公開 · 12問 · 1年前

    lesson 3 ORGANISASYON NG DISKURSONGPASALITA AT PASULAT

    lesson 3 ORGANISASYON NG DISKURSONGPASALITA AT PASULAT

    12問 • 1年前
    ユーザ名非公開

    speech

    speech

    ユーザ名非公開 · 10問 · 1年前

    speech

    speech

    10問 • 1年前
    ユーザ名非公開

    Intellectual Revolutions that Defined Society

    Intellectual Revolutions that Defined Society

    ユーザ名非公開 · 41問 · 1年前

    Intellectual Revolutions that Defined Society

    Intellectual Revolutions that Defined Society

    41問 • 1年前
    ユーザ名非公開

    Technology as a Way of Revealing

    Technology as a Way of Revealing

    ユーザ名非公開 · 23問 · 1年前

    Technology as a Way of Revealing

    Technology as a Way of Revealing

    23問 • 1年前
    ユーザ名非公開

    Human Flourishing

    Human Flourishing

    ユーザ名非公開 · 40問 · 1年前

    Human Flourishing

    Human Flourishing

    40問 • 1年前
    ユーザ名非公開

    lahat na

    lahat na

    ユーザ名非公開 · 21問 · 1年前

    lahat na

    lahat na

    21問 • 1年前
    ユーザ名非公開

    the good life

    the good life

    ユーザ名非公開 · 22問 · 1年前

    the good life

    the good life

    22問 • 1年前
    ユーザ名非公開

    When Technology and Humanity Cross

    When Technology and Humanity Cross

    ユーザ名非公開 · 45問 · 1年前

    When Technology and Humanity Cross

    When Technology and Humanity Cross

    45問 • 1年前
    ユーザ名非公開

    mga kulang

    mga kulang

    ユーザ名非公開 · 14問 · 1年前

    mga kulang

    mga kulang

    14問 • 1年前
    ユーザ名非公開

    Lesson 1: Information and Communication Technology

    Lesson 1: Information and Communication Technology

    ユーザ名非公開 · 9問 · 1年前

    Lesson 1: Information and Communication Technology

    Lesson 1: Information and Communication Technology

    9問 • 1年前
    ユーザ名非公開

    tayutay kinds

    tayutay kinds

    ユーザ名非公開 · 18問 · 1年前

    tayutay kinds

    tayutay kinds

    18問 • 1年前
    ユーザ名非公開

    tayutay general

    tayutay general

    ユーザ名非公開 · 6問 · 1年前

    tayutay general

    tayutay general

    6問 • 1年前
    ユーザ名非公開

    tayutay kinds p2

    tayutay kinds p2

    ユーザ名非公開 · 7問 · 1年前

    tayutay kinds p2

    tayutay kinds p2

    7問 • 1年前
    ユーザ名非公開

    history of computer 11-20/20

    history of computer 11-20/20

    ユーザ名非公開 · 27問 · 1年前

    history of computer 11-20/20

    history of computer 11-20/20

    27問 • 1年前
    ユーザ名非公開

    Basic Computing Periods - Ages

    Basic Computing Periods - Ages

    ユーザ名非公開 · 29問 · 1年前

    Basic Computing Periods - Ages

    Basic Computing Periods - Ages

    29問 • 1年前
    ユーザ名非公開

    generation

    generation

    ユーザ名非公開 · 14問 · 1年前

    generation

    generation

    14問 • 1年前
    ユーザ名非公開

    MODULE 3: THE WEB AND THE INTERNET

    MODULE 3: THE WEB AND THE INTERNET

    ユーザ名非公開 · 39問 · 1年前

    MODULE 3: THE WEB AND THE INTERNET

    MODULE 3: THE WEB AND THE INTERNET

    39問 • 1年前
    ユーザ名非公開

    types of websites

    types of websites

    ユーザ名非公開 · 14問 · 1年前

    types of websites

    types of websites

    14問 • 1年前
    ユーザ名非公開

    lesson 2: the internet

    lesson 2: the internet

    ユーザ名非公開 · 44問 · 1年前

    lesson 2: the internet

    lesson 2: the internet

    44問 • 1年前
    ユーザ名非公開

    history of computer 1-10/20

    history of computer 1-10/20

    ユーザ名非公開 · 33問 · 1年前

    history of computer 1-10/20

    history of computer 1-10/20

    33問 • 1年前
    ユーザ名非公開

    lesson 1 books

    lesson 1 books

    ユーザ名非公開 · 5問 · 1年前

    lesson 1 books

    lesson 1 books

    5問 • 1年前
    ユーザ名非公開

    FLEXIBILITY TRAININGEXERCISES

    FLEXIBILITY TRAININGEXERCISES

    ユーザ名非公開 · 54問 · 1年前

    FLEXIBILITY TRAININGEXERCISES

    FLEXIBILITY TRAININGEXERCISES

    54問 • 1年前
    ユーザ名非公開

    pilates

    pilates

    ユーザ名非公開 · 6問 · 1年前

    pilates

    pilates

    6問 • 1年前
    ユーザ名非公開

    elements of literature

    elements of literature

    ユーザ名非公開 · 96問 · 1年前

    elements of literature

    elements of literature

    96問 • 1年前
    ユーザ名非公開

    elements of poetry

    elements of poetry

    ユーザ名非公開 · 34問 · 1年前

    elements of poetry

    elements of poetry

    34問 • 1年前
    ユーザ名非公開

    elements of short story

    elements of short story

    ユーザ名非公開 · 26問 · 1年前

    elements of short story

    elements of short story

    26問 • 1年前
    ユーザ名非公開

    elements of novel

    elements of novel

    ユーザ名非公開 · 12問 · 1年前

    elements of novel

    elements of novel

    12問 • 1年前
    ユーザ名非公開

    elements of essay

    elements of essay

    ユーザ名非公開 · 10問 · 1年前

    elements of essay

    elements of essay

    10問 • 1年前
    ユーザ名非公開

    elements of literature (2)

    elements of literature (2)

    ユーザ名非公開 · 83問 · 1年前

    elements of literature (2)

    elements of literature (2)

    83問 • 1年前
    ユーザ名非公開

    general

    general

    ユーザ名非公開 · 15問 · 1年前

    general

    general

    15問 • 1年前
    ユーザ名非公開

    elements of drama

    elements of drama

    ユーザ名非公開 · 13問 · 1年前

    elements of drama

    elements of drama

    13問 • 1年前
    ユーザ名非公開

    sculpture

    sculpture

    ユーザ名非公開 · 11問 · 1年前

    sculpture

    sculpture

    11問 • 1年前
    ユーザ名非公開

    tao

    tao

    ユーザ名非公開 · 5問 · 1年前

    tao

    tao

    5問 • 1年前
    ユーザ名非公開

    3 gec 8 finals (PPT)

    3 gec 8 finals (PPT)

    ユーザ名非公開 · 27問 · 1年前

    3 gec 8 finals (PPT)

    3 gec 8 finals (PPT)

    27問 • 1年前
    ユーザ名非公開

    module 8 why the future doesn’t need us

    module 8 why the future doesn’t need us

    ユーザ名非公開 · 23問 · 1年前

    module 8 why the future doesn’t need us

    module 8 why the future doesn’t need us

    23問 • 1年前
    ユーザ名非公開

    module 9 The Information Age (Gutenberg to Social Media)

    module 9 The Information Age (Gutenberg to Social Media)

    ユーザ名非公開 · 59問 · 1年前

    module 9 The Information Age (Gutenberg to Social Media)

    module 9 The Information Age (Gutenberg to Social Media)

    59問 • 1年前
    ユーザ名非公開

    MODULE 10Biodiversity and Healthy Society

    MODULE 10Biodiversity and Healthy Society

    ユーザ名非公開 · 32問 · 1年前

    MODULE 10Biodiversity and Healthy Society

    MODULE 10Biodiversity and Healthy Society

    32問 • 1年前
    ユーザ名非公開

    MODULE 11 Genetically Modified Organisms: Science, Health and Politics

    MODULE 11 Genetically Modified Organisms: Science, Health and Politics

    ユーザ名非公開 · 40問 · 1年前

    MODULE 11 Genetically Modified Organisms: Science, Health and Politics

    MODULE 11 Genetically Modified Organisms: Science, Health and Politics

    40問 • 1年前
    ユーザ名非公開

    module 11 continuation

    module 11 continuation

    ユーザ名非公開 · 19問 · 1年前

    module 11 continuation

    module 11 continuation

    19問 • 1年前
    ユーザ名非公開

    問題一覧

  • 1

    is a term used to describe actions taken by someone to gain unauthorized access to a computer.

    hacking

  • 2

    The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

    hacking

  • 3

    The process by which cyber criminals gain access to your computer.

    hacking

  • 4

    Find weaknesses or pre-existing bugs in your security settings and exploit them in order to access your information.

    hacking

  • 5

    ___providing a back door for hackers to enter and search for your information.

    trojan horse

  • 6

    Install a Trojan horse, providing a back door for hackers to enter and search for your information.

    hacking

  • 7

    is one of the more common ways to infiltrate or damage your computer.

    malware

  • 8

    infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

    malware

  • 9

    Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information.

    malware

  • 10

    Reformat the hard drive of your computer causing you to lose all your information.

    malware

  • 11

    Alter or delete files.

    malware

  • 12

    Steal sensitive information.

    malware

  • 13

    Send emails on your behalf.

    malware

  • 14

    Take control of your computer and all the software running on it.

    malware

  • 15

    is a common type of online fraud.

    pharming

  • 16

    A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

    pharming

  • 17

    actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

    pharming

  • 18

    is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.

    phishing

  • 19

    Fake emails, text messages and websites created to look like they're from authentic companies.

    phishing

  • 20

    They're sent by criminals to steal personal and financial information from you.

    phishing

  • 21

    This is also known as "spoofing".

    phishing

  • 22

    Trick you into giving them information by asking you to update, validate or confirm your account.

    phishing

  • 23

    It is often presented in a manner than seems official and intimidating, to encourage you to take action.

    phishing

  • 24

    Provides cyber criminals with your username and passwords so that they can access your accounts your online bank account, shopping accounts and steal your credit card numbers.

    phishing

  • 25

    Is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

    ransomware

  • 26

    The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.

    ransomware

  • 27

    common types of ransomware:

    1. Lockscreen ransomware 2. Encryption ransomware

  • 28

    displays an image that prevents you from accessing your computer

    lockscreen ransomware

  • 29

    encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

    encryption ransomware

  • 30

    will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access.

    ransomware

  • 31

    the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.

    ransomware

  • 32

    is one of the more common methods of both sending information out and collecting it from unsuspecting people.

    spam

  • 33

    The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

    spam

  • 34

    Annoy you with unwanted junk mail.

    spam

  • 35

    Create a burden for communications service providers and businesses to filter electronic messages.

    spam

  • 36

    Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.

    spam

  • 37

    Provide a vehicle for malware, scams, fraud and threats to your privacy.

    spam

  • 38

    often used by third parties to infiltrate your computer.

    Spy & adware

  • 39

    Software that collects personal information about you without you knowing.

    Spyware & Adware

  • 40

    They often come in the form of a 'free' download and are installed automatically with or without your consent.

    Spyware & Adware

  • 41

    These are difficult to remove and can infect your computer

    Spyware & Adware

  • 42

    Collect information about you without you knowing about it and give it to third parties.

    Spyware & Adware

  • 43

    Send your usernames, passwords, surfing habits, list of applications you've downloaded,

    Spyware & Adware

  • 44

    Change the way your computer runs without your knowledge.

    Spyware & Adware

  • 45

    Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

    Spyware & Adware

  • 46

    A malicious program that is disguised as, or embedded within, legitimate software.

    trojan horses

  • 47

    It is an executable file that will install itself and run automatically once it's downloaded.

    trojan horses

  • 48

    Delete your files.

    trojan horses

  • 49

    Use your computer to hack other computers.

    trojan horses

  • 50

    Watch you through your web cam.

    trojan horses

  • 51

    Log your key strokes such as a credit card number you entered in an online purchase.

    trojan horses

  • 52

    Record usernames, passwords and other personal information.

    trojan horses

  • 53

    Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

    virus

  • 54

    Send spam.

    virus

  • 55

    Provide criminals with access to your computer and contact lists.

    virus

  • 56

    Scan and find personal information like passwords on your computer.

    virus

  • 57

    Hijack your web browser.

    virus

  • 58

    Disable your security settings.

    virus

  • 59

    Display unwanted ads.

    virus

  • 60

    When a program is running, it could infiltrate your hard drive and also spread to USB keys and external hard drives.

    virus

  • 61

    Any attachment you create using this program and send to someone else could also infect them

    virus

  • 62

    is another method used by cyber criminals to capture personal information.

    Wi-Fi Eavesdropping

  • 63

    Virtual "listening in" on information that's shared over an unsecure (not encrypted) WiFi network.

    Wi-Fi Eavesdropping

  • 64

    Potentially access your computer with the right equipment.

    Wi-Fi Eavesdropping

  • 65

    Steal your personal information including logins and passwords.

    Wi-Fi Eavesdropping

  • 66

    are a common threat to computers and the Internet as a whole.

    worms

  • 67

    goes to work on its own without attaching itself to files or programs.

    worms

  • 68

    It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network

    worms

  • 69

    Spread to everyone in your contact list.

    worms

  • 70

    Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.

    worms