(CIS 100) Testbank Questions: Threats to Your Digital Life over Chapter 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Packet Sniffer

A program that examines the contents of all network traffic.

Polymorphic virus

A virus that changes its own code to avoid detection.

Trojan horse

Appears to be useful but does something malicious in the background.

Multi - partite virus

Attempts to infect computers through multiple methods.

Worm

Attempts to travel between systems through network connections to spread an infection

Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) _____________ .

Black - hat hacker

The most common occurrence of identity compromise is through _________ .

Data breaches of a company that stores your information

All of the following pieces of information should be highly guarded while using a public Wi- Fi hotspot, EXCEPT ________ .

First Name

A(n) ________ is a program that analyzes the contents of data packets on a network.

Hacker

Anyone who breaks into a computer system is known as a(n) __________ .

Hacker

______ is software that has a malicious intent.

Malware

______ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.

Pharming

Which of the following virus types changes its own code to avoid detection?

Polymorphic

___________ are new browser windows launched by a website.

Pop- Ups

___________ tries to convince you that your computer is infected.

Scareware

A virus hidden in a website is known as a(n) ________ .

Script

__________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

Script

A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) __________ virus.

Stealth

Which of the following statements is NOT true about identity theft?

Thieves can easily defeat 2 factor authentication

A(n) _________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.

Trojan Horse

Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) __________ .

White - hat hacker

Which of the following are considered slightly different from viruses because they can run without user interaction?

Worms

Taking someone's personal information and posing as that person for financial or legal transactions is known as _______ .

identity Theft

These are all important protective measures for preventing viruses EXCEPT ________ .

not using Wi - Fi hotspots


Kaugnay na mga set ng pag-aaral

AAPC Module 3 Fundamentals of Medicine

View Set

Latin and Greek Root Words: Puzzle Pieces that Make Up Words

View Set

Chapter 5 Network Visibility & Segmentation

View Set