1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Why should you not click on an embedded hyperlink?
They can take up too much disk space on your computer.
They can take you to a different website other than what is being advertised.
They seldom work properly.
They are slow.
They can take you to a different website other than what is being advertised.
Why would you want to block external content from downloading into your email client?
To prevent spammers from knowing that your email address is valid
To slow down your email client so you can read the message
To take advantage of the remote reading pane
To prevent your computer's graphics processor utility buffer from filling too quickly
To prevent spammers from knowing that your email address is valid
A(n) _____ is a list of email addresses from senders from whom you do not want to receive messages.
whitelist
blacklist
redlist
greenlist
blacklist
How does an attacker use a malvertising attack?
Resource objects are sent as email attachments with a source that pretends to be a well-known advertising agency.
Attackers directly infect the website that is being compromised by identifying a vulnerability in the web server.
Java applets are attached to spam messages that pretend to be advertisements.
Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.
Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.
Which of the follow web browser additions provides links to external programs?
Java applet
extension
plug-in
add-on
plug-in
What is the first step in defending against Internet-based attacks?
Use a web browser that supports automatic downloads.
Do not open email attachments.
Add security extensions to the web browser.
Ensure that the computer itself is properly secured.
Ensure that the computer itself is properly secured.
A reading pane allows the user to read an email message_________.
without actually opening it
only one time
from a remote location
after the attachment has been saved to the hard drive
without actually opening it
A cookie that was not created by the website that attempts to access it is called a(n)_____.
resource cookie
third-party cookie
first-party cookie
second-party cookie
third-party cookie
Which of the following is true about a cookie?
It can contain a virus.
It places a small file on the web server computer sent from the browser.
It can pose a security and privacy risk.
It acts like a worm.
It can pose a security and privacy risk.
Bob's computer was infected from a drive-by download attack. What did Bob do to get infected?
He clicked Download.
He viewed a website.
He opened an email attachment.
He unknowingly sent a virus to a website.
He viewed a website.
Which is the most popular scripting code used with webpages?
Hypertext Markup Language (HTML)
JavaScript
Hypertext Transport Protocol (HTTP)
Java
JavaScript
Each of the following is an addition that could be added to a web browser to support dynamic browsing except ________.
add-ons
JScript
plug-ins
extension
JScript
The most secure option when configuring a web browser for security is __________.
Deny first-party and third-party cookies.
Accept first-party cookies but deny third-party cookies.
Accept first-party cookies.
Reject locally shared objects but accept second-party cookies.
Deny first-party and third-party cookies.
Which of the following is not a secure Internet practice?
Restrict cookies in web browsers through browser settings.
Do not click on embedded hyperlinks in an email.
Run JavaScript code to prevent attacks.
Double-check spelling on a typed web address before submitting.
Run JavaScript code to prevent attacks.
Which of the following is not a web browser addition to enhance security?
local intranet flash signal
website reputation
plug-in validation
URL expander
local intranet flash signal
What is the format used to write webpages?
Hypertext Markup Language (HTML)
Hypertext Transport Protocol (HTTP)
Microsoft Adobe Printer (MAP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
Hypertext Markup Language (HTML)
Which type of cookie is the most complex?
plug-in cookie
control cookie (CC)
locally shared object (LSO)
extender cookie (CE)
locally shared object (LSO)
What technique do attackers use in order to circumvent text-based spam filters?
Flash spam
attachment spam
image spam
object spam
image spam
Which of the following is the more recent and advanced electronic email system?
Transmission Control Protocol (TCP)
Simple Mail Transfer Protocol (SMTP)
IMAP (Internet Mail Access Protocol)
Post Office Protocol (POP)
IMAP (Internet Mail Access Protocol)
Each of the following is true about the Internet except:
It is not controlled by a single organization or government entity.
It is a local network of computers and networks.
Industry, governments, schools, and individuals all loosely cooperate in the Internet's self-governance.
It is composed of networks to which devices are attached.
It is a local network of computers and networks.