CPTR-105 Chapter 9
A ________ is a virus that is attached to documents. Question 5 options: A) macro virus B) polymorphic virus C) script virus D) Trojan horse
A
All of the following activities may infect your computer with a virus EXCEPT ________. Question 20 options: A) printing a document B) downloading video files from peer-to-peer sites C) sharing flash drives D) downloading or running an e-mail attachment file
A
The Internet Crime Complaint Center (IC3) is a partnership between the ________. Question 18 options: A) FBI and National White Collar Crime Center B) FBI and the IRS C) FBI and the CIA D) NRA and the U.S. Department of Defense
A
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. Question 3 options: A) pharming B) polymorphing C) pretexting D) phishing
A
Which of the following is NOT a virus category? Question 7 options: A) Pharming B) Logic bomb C) Macro D) Worm
A
Which type of virus was the famous Michelangelo virus? Question 8 options: A) A time bomb B) A worm C) A script virus D) An e-mail virus
A
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Question 7 options: A) steal your logons and passwords for various accounts B) launch a denial of service (DoS) attack on your computer C) use your debit card information to purchase items illegally D) assume your identity
B
A(n) ________ is the portion of virus code that is unique to a particular computer virus. Question 19 options: A) encryption code B) virus signature C) virus pattern D) compression code
B
Creating and distributing ________ is one of the most widespread types of cybercrimes. Question 10 options: A) spam B) computer viruses C) zombies D) cookies
B
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. Question 9 options: A) pharming B) engineering C) pretexting D) theft
B
Which of the following classifications of viruses can change its own code to avoid detection? Question 5 options: A) Worm B) Polymorphic C) Multipartite D) Stealth
B
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Question 15 options: A) Social networking B) Cybercrime C) Hacking D) Phishing
B
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. Question 3 options: A) zombie B) denial of service (DoS) C) rootkit D) logic bomb
C
Government impersonation scams involve ________. Question 14 options: A) collecting funds and not delivering the goods B) running auctions that do not exist C) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS D) convincing people to send money as a "good faith" gesture
C
Regarding computer protection, quarantining is defined as ________. Question 6 options: A) updating your antivirus software B) deleting an infected file C) placing a found virus in a secure area on the hard drive D) repairing an infected file
C
Which of the following statements about cookies is NOT true? Question 1 options: A) Cookies are text files. B) Cookies help companies determine the traffic flow through their website. C) Cookies obtain your personal information by searching your hard drive. D) Some companies sell the personal information found in cookies to other companies.
C
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. Question 8 options: A) a packet sniffer B) a packet filter C) a firewall D) antivirus software
C
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. Question 2 options: A) A Trojan horse B) A polymorphic virus C) A DDoS attack D) Pretexting
C
________ is a program that gathers information about your surfing habits without your knowledge. Question 17 options: A) Adware B) Shareware C) Spyware D) Ghostware
C
A ________ is a virus that is triggered on a certain date. Question 4 options: A) worm B) logic bomb C) macro D) time bomb
D
A whole-house surge protector is installed ________. Question 12 options: A) on each device and appliance B) on computers C) at the power line from the street D) at the breaker panel
D
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own. Question 6 options: A) script virus B) macro virus C) encryption virus D) worm
D
All of the following are top cybercrimes reported to the IC3 EXCEPT ________. Question 1 options: A) non-auction scam B) advance fee fraud C) identity theft D) malware fraud
D
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. Question 16 options: A) fire extinguisher B) firebreak C) firehouse D) firewall
D
One type of CAPTCHA is ________. Question 9 options: A) antivirus software B) a password method C) a rootkit virus D) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D
Using your computer for non-work activities while you are being paid to work is known as ________. Question 13 options: A) cyberbreaking B) cyberlazing C) cybersleeping D) cyberloafing
D
Viruses, adware, and spyware are referred to collectively as ________. Question 10 options: A) bloatware B) alertware C) firmware D) grayware
D
Which is NOT one of the four key pieces of personal information you should protect from identity thieves? Question 11 options: A) Street address B) Social Security number C) Date of birth D) Anniversary
D
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities. Question 11 options: A) Green-hat B) Black-hat C) Grey-hat D) White-hat
D
A(n) ________ backup makes a copy of all changes since the last backup. Question 12 options: A) full B) image C) incremental D) data
ITS NOT A. C?
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. Question 4 options: A) packet switching B) logical port blocking C) packet filtering D) static addressing
ITS NOT C. B?