MISY chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

_____ viruses are often transmitted by a flash drive left in a USB port.

Boot-sector

CAPTCHA stands for _______

Completely Automated Public Turing Test to Tell Computers and Humans Apart

The protocol using port 53 is

DNS

IC3 is a partnership between

FBI and National White Collar Crime Center

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

Which of these statements about physically protecting your computer is FALSE?

Power surges can be blocked by using a computer surround

One virus called ____ is used to trick users into downloading an infected file to their phone, which steals online banking information.

Spyeye Mobile Banking

_______ floods a computer with requests until it shuts own and refuses to answer any requests for information

a DDoS attack

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing

a firewall

Which type of virus was the famous Michelangelo virus?

a time bomb

All of the following are the main functions of antivirus software, EXCEPT

assassinating all viruses

All of the following are top cyber crimes reported to the IC3 in 2011, except

child porn

Creating and disseminating ________ if one of the most widespread types of cybercrimes.

computer viruses

Which of the folioing statements about cookies is NOT true?

cookies obtain your personal information by searching your hard drive

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer

cybercrime

Using your computer for non work activities while you are being paid to do a job is known as

cyberloafing

Social ________ is named after a housing construction feature that slows the spread of fires from house to house

engineering

Named after a housing construction feature that slows the spread of fires from house to houes

firewall

Adware and spyware are referred to collectively as _______.

grayware

Rules for creating passwords include all of the following, EXCEPT

keep your password written down and stored in any easy-to-remember location

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT

launch a denial of service (DoS) attack on your computer

All of the following are ways that can infect your computer with a virus, EXCEPT

logging into email

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as

logical port blocking

A _____ is a virus that is attached to documents such as Word or Excel files.

macro virus

FBI related scams involve

people pretending to represent official organizations

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as

pharming

With regard to computer protection, quarantining is defined as

placing a found virus in a secure area on the hard drive

A virus that changes its own code or periodically rewrites itself to avoid detection.

polymorphic

All of the folioing are categories of viruses, EXCEPT

snakes

An unwanted piggyback program that usually downloads with software you are installing from the Internet

spyware

All of the following are considered cybercrimes, EXCEPT

theft of a cell phone

A ____ is a virus that is triggered on a certain date.

time bomb

A(n) ____ is the portion of virus code that is unique to a particular computer virus

virus signature

Hackers that break into systems for non-malicious reasons such as to test system security vulnerabilities

white-hat

A(n) ________ takes advantage of file transport methods to spread on their own.

worm


Conjuntos de estudio relacionados

Chapter 3 | Uniform Securities Act - Administration and Fraudulent Act

View Set

日本語のまねきねこ・だい1か

View Set

Chapter 8: Classroom Management and Structure

View Set

Ch. 3 reading quiz (cellular level of organization)

View Set

Timby's Reproductive System SATA

View Set