Ch. 9 Testbank

¡Supera tus tareas y exámenes ahora con Quizwiz!

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. theft pharming pretexting engineering

engineering

adware and spyware are referred to collectively as ____ -viruses -alertware -firmware -grayware

grayware

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. -launch a denial of service (DoS) attack on your computer -assume your identity -use your debit card information to purchase items illegally -steal your logons and passwords for various accounts

launch a denial of service (DoS) attack on your computer

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. -logical port blocking -static addressing -packet switching -packet filtering

logical port blocking

FBI-related scams involve ________. -people pretending to represent official organizations such as the Dept. of Homeland Security or IRS -running auctions that do not exist -collecting funds and not delivering the goods -convincing people to send money as a "good faith" gesture

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

Which of the following is NOT a virus category? -Macro -logic bomb -worm -pharming

pharming

Which of the following classifications of viruses can change its own code to avoid detection? -stealth -polymorphic -worm -multipartite

polymorphic

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. -denial of service -rootkit -zombie -logic bomb

rootkit

CAPTCHA IS ___ -the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website -a rootkit virus -password method -antivirus software

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

Rules for creating passwords include all of the following EXCEPT ________. -change your password frequently -use letters, numbers and symbols in your passwords -keep your password a secret -use a dictionary to find a lengthy word that is easy to remember

use a dictionary to find a lengthy word that is easy to remember

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. -black-hat -white-hat -gray-hat -green-hat

white-hat

A(n) ________ takes advantage of file transport methods to spread on its own. -script virus -macro virus -encryption virus -worm

worm

Creating and distributing ________ is one of the most widespread types of cybercrimes. -computer viruses -zombies -spam -cookies

computer viruses

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? -hacking -phishing -social networking -cybercrime

cybercrime

________ floods a computer with requests until it shuts down and refuses to answer any requests for information. -a polymorphic virus -pretexting -a DDoS attack -a trojan horse

A DDoS attack

Which of the following statements about cookies is NOT true? -Some companies sell the personal information found in cookies to other companies. -Cookies are text files. -Cookies help companies determine the traffic flow through their website. -Cookies obtain your personal information by searching your hard drive.

Cookies obtain your personal information by searching your hard drive.

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

a firewall

Which type of virus was the famous Michelangelo virus?

a time bomb

________ viruses are often transmitted by a flash drive left in a USB port. -macro -logic bomb -time bomb -boot-sector

boot-sector


Conjuntos de estudio relacionados

The Strategy of International Business - INTB Exam 3 Chapter 12

View Set

MySQL - Administration 30 Functions

View Set

Chapter 3: Cellular Form and Function (BIO201)

View Set

American Yawp Chapter 7, American Yawp Chapter 4, Chapter 5 American Yawp, Chapter 5 - American Yawp: The American Revolution, American Yawp Chapter 4, Chapter 4 Vocabulary "The American Yawp", American Yawp Chapter 5, American Yawp Chapter 6, Americ...

View Set

Chapter 58 Gallbladder and Pancreatic Disorders

View Set