Chapter 11
True/False
1.
T
2.
T
3.
F
4.
T
5.
F
6.
T
7.
T
8.
T
9.
F
10.
F
11.
T
12.
F
Multiple Choice
1. B
2. D
3. A
4. C
5. C
6. D
7. D
8. C
Matching
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10. F
Short Answer
1. There are
two ways that an antivirus programs detect and identify a virus.
First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
Secondly,
it scans/monitors the programs by analyzing its behavior, such as modification
of critical system files/important data files, if any behavior seems
suspicious, then the antivirus program will alert the user that there are
suspicious behavior, or it may alert the user that malicious actions are about
to be performed, and block that behavior.
Virus hoax is a
message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.
2. Energy star is a joint program of the U.S.
Environmental Protection Agency and the U.S. Department of Energy helping us
all save money and protect the environment through energy efficient products
and practices. Energy efficient choices can save
families about a third on their energy bill with similar savings of greenhouse
gas emissions, without sacrificing features, style or comfort. Energy star helps you make the energy efficient
choice.
How users should handle
obsolete computers is the users
should recycle obsolete computers properly. Then, the revamped end product
would be sold at a low price or donated to the less fortunate in the society.
3. Information privacy, or data privacy is the relationship
between collection and dissemination of data, technology, the public expectation
of privacy, and the legal
and political issues surrounding them.
Five ways to safeguard your personal
information :
-
Don’t use your
primary email address
-
Don’t give out
your phone number
-
Don’t give up
your birth date
-
Don’t ever
give up your credit card number, driver’s lisence number, or social security
number
-
Be savvy
4. Two methods for avoiding phishing attacks :
-
Never fill out forms in e-mail messages that ask
for personal financial information
-
If you do provide personal information (like a
credit card number), do so only via a secure website or the telephone
How Clickjacking works :
Clickjacking
is possible because seemingly harmless features of HTML web pages can be
employed to perform unexpected actions. A
clickjacked page tricks a user into performing undesired actions by clicking on
a concealed link. On a clickjacked page, the attackers load another page over
it in a transparent layer. The users think that they are clicking visible
buttons, while they are actually performing actions on the hidden page. The
hidden page may be an authentic page; therefore, the attackers can trick users
into performing actions which the users never intended. There is no way of
tracing such actions to the attackers later, as the users would have been
genuinely authenticated on the hidden page.
5.
Many
businesses use content filtering to limit employees’ Web access. One approach
to content filtering is through a rating system of the Internet Content Rating
Association (ICRA). Another approach to content filtering is to use filtering
software.
ICRA, which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If the content at the web site goes beyond the rating limits set in the Web browser software, a user cant access the website. Concerned parents can set the rating limits and prevent this limits from being changed by using a password.
ICRA, which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If the content at the web site goes beyond the rating limits set in the Web browser software, a user cant access the website. Concerned parents can set the rating limits and prevent this limits from being changed by using a password.
No comments:
Post a Comment