CPSC 301 Ch 4

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:04 AM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Why should you not click on an embedded hyperlink?

  • They can take up too much disk space on your computer.

  • They can take you to a different website other than what is being advertised.

  • They seldom work properly.

  • They are slow.

They can take you to a different website other than what is being advertised.

2
New cards

Why would you want to block external content from downloading into your email client?

  • To prevent spammers from knowing that your email address is valid

  • To slow down your email client so you can read the message

  • To take advantage of the remote reading pane

  • To prevent your computer's graphics processor utility buffer from filling too quickly

To prevent spammers from knowing that your email address is valid

3
New cards

A(n) _____ is a list of email addresses from senders from whom you do not want to receive messages.

  • whitelist

  • blacklist

  • redlist

  • greenlist

blacklist

4
New cards

How does an attacker use a malvertising attack?

  • Resource objects are sent as email attachments with a source that pretends to be a well-known advertising agency.

  • Attackers directly infect the website that is being compromised by identifying a vulnerability in the web server.

  • Java applets are attached to spam messages that pretend to be advertisements.

  • Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.

Attackers may infect the third-party advertising networks so that their malware is distributed through ads sent to user's web browsers.

5
New cards

Which of the follow web browser additions provides links to external programs?

  • Java applet

  • extension

  • plug-in

  • add-on

plug-in

6
New cards

What is the first step in defending against Internet-based attacks?

  • Use a web browser that supports automatic downloads.

  • Do not open email attachments.

  • Add security extensions to the web browser.

  • Ensure that the computer itself is properly secured.

Ensure that the computer itself is properly secured.

7
New cards

A reading pane allows the user to read an email message_________.

  • without actually opening it

  • only one time

  • from a remote location

  • after the attachment has been saved to the hard drive

without actually opening it

8
New cards

A cookie that was not created by the website that attempts to access it is called a(n)_____.

  • resource cookie

  • third-party cookie

  • first-party cookie

  • second-party cookie

third-party cookie

9
New cards

Which of the following is true about a cookie?

  • It can contain a virus.

  • It places a small file on the web server computer sent from the browser.

  • It can pose a security and privacy risk.

  • It acts like a worm.

It can pose a security and privacy risk.

10
New cards

Bob's computer was infected from a drive-by download attack. What did Bob do to get infected?

  • He clicked Download.

  • He viewed a website.

  • He opened an email attachment.

  • He unknowingly sent a virus to a website.

He viewed a website.

11
New cards

Which is the most popular scripting code used with webpages?

  • Hypertext Markup Language (HTML)

  • JavaScript

  • Hypertext Transport Protocol (HTTP)

  • Java

JavaScript

12
New cards

Each of the following is an addition that could be added to a web browser to support dynamic browsing except ________.

  • add-ons

  • JScript

  • plug-ins

  • extension

JScript


13
New cards

The most secure option when configuring a web browser for security is __________.

  • Deny first-party and third-party cookies.

  • Accept first-party cookies but deny third-party cookies.

  • Accept first-party cookies.

  • Reject locally shared objects but accept second-party cookies.

Deny first-party and third-party cookies.

14
New cards

Which of the following is not a secure Internet practice?

  • Restrict cookies in web browsers through browser settings.

  • Do not click on embedded hyperlinks in an email.

  • Run JavaScript code to prevent attacks.

  • Double-check spelling on a typed web address before submitting.

Run JavaScript code to prevent attacks.

15
New cards

Which of the following is not a web browser addition to enhance security?

  • local intranet flash signal

  • website reputation

  • plug-in validation

  • URL expander

local intranet flash signal

16
New cards

What is the format used to write webpages?

  • Hypertext Markup Language (HTML)

  • Hypertext Transport Protocol (HTTP)

  • Microsoft Adobe Printer (MAP)

  • Transmission Control Protocol/Internet Protocol (TCP/IP)

Hypertext Markup Language (HTML)

17
New cards

Which type of cookie is the most complex?

  • plug-in cookie

  • control cookie (CC)

  • locally shared object (LSO)

  • extender cookie (CE)

locally shared object (LSO)


18
New cards

What technique do attackers use in order to circumvent text-based spam filters?

  • Flash spam

  • attachment spam

  • image spam

  • object spam

image spam


19
New cards

Which of the following is the more recent and advanced electronic email system?

  • Transmission Control Protocol (TCP)

  • Simple Mail Transfer Protocol (SMTP)

  • IMAP (Internet Mail Access Protocol)

  • Post Office Protocol (POP)

IMAP (Internet Mail Access Protocol)


20
New cards

Each of the following is true about the Internet except:

  • It is not controlled by a single organization or government entity.

  • It is a local network of computers and networks.

  • Industry, governments, schools, and individuals all loosely cooperate in the Internet's self-governance.

  • It is composed of networks to which devices are attached.

It is a local network of computers and networks.

Explore top flashcards

flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)
flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)