CIS105 Ch 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. 1. a packet sniffer 2. a firewall 3. a packet filter 4. antivirus software

2. a firewall

A ________ is a virus that is attached to documents such as Word or Excel files. 1. script virus 2. macro virus 3. polymorphic virus 4. worm

2. macro virus

CAPTCHA stands for ________. 1. Completely Amazing Public Turing Test to Tell Computers and Humans Apart 2. Completely Automated Private Turing Trial to Tell Computers and Humans Apart 3. Completely Automated Public Turing Test to Tell Computers and Humans Apart 4. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.

3. Completely Automated Public Turing Test to Tell Computers and Humans Apart

Which of the following classifications of viruses can change its own code to avoid detection? 1. Stealth 2. Multipartite 3. Polymorphic 4. Worm

3. Polymorphic

All of the following are considered cybercrimes, EXCEPT ________. 1. identity theft 2. non-delivery of merchandise 3. theft of a cell phone 4. hacking

3. theft of a cell phone

All of the following are the main functions of antivirus software, EXCEPT ________. 1. looking for virus signatures 2. quarantining viruses 3. inoculating key files 4. assassinating all viruses

4. assassinating all viruses

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.

Spyeye Mobile Banking

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. a. engineering b. theft c. pretexting d. pharming

a. engineering

Which type of virus was the famous Michelangelo virus? a. A worm b. A time bomb c. A script virus d. An e-mail virus

b. A time bomb

________ viruses are often transmitted by a flash drive left in a USB port. a. Logic bomb b. Boot-sector c. Macro d. Encryption

b. Boot-sector

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? a. Social networking b. Cybercrime c. Phishing d. Hacking

b. Cybercrime

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. a. Spyware Mobile Banking b. Spyeye Mobile Banking c. Spyware Online Banking d. Spyeye Online Banking

b. Spyeye Mobile Banking

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. a. a packet sniffer b. a firewall c. a packet filter d. antivirus software

b. a firewall

Creating and disseminating ________ is one of the most widespread types of cybercrimes. a. spam b. computer viruses c. fake credit cards d. FBI-related scams

b. computer viruses

Adware and spyware are referred to collectively as ________. a. viruses b. grayware c. alertware d. firmware

b. grayware

A ________ is a virus that is attached to documents such as Word or Excel files. a. script virus b. macro virus c. polymorphic virus d. worm

b. macro virus

CAPTCHA stands for ________. a. Completely Amazing Public Turing Test to Tell Computers and Humans Apart b. Completely Automated Private Turing Trial to Tell Computers and Humans Apart c. Completely Automated Public Turing Test to Tell Computers and Humans Apart d. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.

c. Completely Automated Public Turing Test to Tell Computers and Humans Apart

The protocol using port 53 is ________. a. FTP control b. STMP c. DNS d. HTTP

c. DNS

IC3 is a partnership between the ________. a. FBI and local police departments b. FBI and National Defense Department c. FBI and National White Collar Crime Center d. National White Collar Crime Center and National Defense Department

c. FBI and National White Collar Crime Center

Which of the following classifications of viruses can change its own code to avoid detection? a. Stealth b. Multipartite c. Polymorphic d. Worm

c. Polymorphic

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. a. Black-hat b. Gray-hat c. White-hat d. Green-hat

c. White-hat

All of the following are considered cybercrimes, EXCEPT ________. a. identity theft b. non-delivery of merchandise c. theft of a cell phone d. hacking

c. theft of a cell phone

All of the following are the main functions of antivirus software, EXCEPT ________. a. looking for virus signatures b. quarantining viruses c. inoculating key files d. assassinating all viruses

d. assassinating all viruses

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. a. use your debit card information to purchase items illegally b. assume your identity c. steal your logon and passwords for various accounts d. launch a denial of service (DoS) attack on your computer

d. launch a denial of service (DoS) attack on your computer

A time bomb is a virus that is triggered when certain conditions are met such as opening a file. true or false

false

A worm infects a host file and waits for that file to be executed on another computer to replicate. true or false

false

All viruses cause serious destruction of computer data. false or true

false

All viruses cause serious destruction of computer data. true or false

false

Hackers most often obtain access to someone's computer via direct access. true or false

false

The only way your identity can be stolen is by a computer. true or false

false

The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. true or false

false

Theft of a tablet is considered cybercrime. false or true

false

Theft of a tablet is considered cybercrime. true or false

false

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. true or false

true

A virus signature is a portion of virus code that is unique to a particular computer virus. false or true

true

A virus signature is a portion of virus code that is unique to a particular computer virus. true or false

true

Creating and spreading online viruses is a cybercrime. true or false

true

Ethical hackers are also known as white-hat hackers. true or false

true

In 1999, the Melissa virus became the first major macro virus to cause problems worldwide. true or false

true

To create a secure password, you should use both uppercase and lowercase letters. true or false

true


Conjuntos de estudio relacionados

Topic E-TroubleShooting Methodology

View Set

Fluid, Electrolyte, and Acid-Base Imbalances (Lewis Med-Surg CH. 16)

View Set

Jaundice, Hepatitis, Cirrhosis, and Liver Cancer Study Guide

View Set

Chapter 51: Assessment and Management of Patients With Diabetes NCLEX

View Set

Professional Nursing Practice Chapter 1: PREPU

View Set