CIS105 Ch 9
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. 1. a packet sniffer 2. a firewall 3. a packet filter 4. antivirus software
2. a firewall
A ________ is a virus that is attached to documents such as Word or Excel files. 1. script virus 2. macro virus 3. polymorphic virus 4. worm
2. macro virus
CAPTCHA stands for ________. 1. Completely Amazing Public Turing Test to Tell Computers and Humans Apart 2. Completely Automated Private Turing Trial to Tell Computers and Humans Apart 3. Completely Automated Public Turing Test to Tell Computers and Humans Apart 4. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.
3. Completely Automated Public Turing Test to Tell Computers and Humans Apart
Which of the following classifications of viruses can change its own code to avoid detection? 1. Stealth 2. Multipartite 3. Polymorphic 4. Worm
3. Polymorphic
All of the following are considered cybercrimes, EXCEPT ________. 1. identity theft 2. non-delivery of merchandise 3. theft of a cell phone 4. hacking
3. theft of a cell phone
All of the following are the main functions of antivirus software, EXCEPT ________. 1. looking for virus signatures 2. quarantining viruses 3. inoculating key files 4. assassinating all viruses
4. assassinating all viruses
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.
Spyeye Mobile Banking
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. a. engineering b. theft c. pretexting d. pharming
a. engineering
Which type of virus was the famous Michelangelo virus? a. A worm b. A time bomb c. A script virus d. An e-mail virus
b. A time bomb
________ viruses are often transmitted by a flash drive left in a USB port. a. Logic bomb b. Boot-sector c. Macro d. Encryption
b. Boot-sector
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? a. Social networking b. Cybercrime c. Phishing d. Hacking
b. Cybercrime
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. a. Spyware Mobile Banking b. Spyeye Mobile Banking c. Spyware Online Banking d. Spyeye Online Banking
b. Spyeye Mobile Banking
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. a. a packet sniffer b. a firewall c. a packet filter d. antivirus software
b. a firewall
Creating and disseminating ________ is one of the most widespread types of cybercrimes. a. spam b. computer viruses c. fake credit cards d. FBI-related scams
b. computer viruses
Adware and spyware are referred to collectively as ________. a. viruses b. grayware c. alertware d. firmware
b. grayware
A ________ is a virus that is attached to documents such as Word or Excel files. a. script virus b. macro virus c. polymorphic virus d. worm
b. macro virus
CAPTCHA stands for ________. a. Completely Amazing Public Turing Test to Tell Computers and Humans Apart b. Completely Automated Private Turing Trial to Tell Computers and Humans Apart c. Completely Automated Public Turing Test to Tell Computers and Humans Apart d. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.
c. Completely Automated Public Turing Test to Tell Computers and Humans Apart
The protocol using port 53 is ________. a. FTP control b. STMP c. DNS d. HTTP
c. DNS
IC3 is a partnership between the ________. a. FBI and local police departments b. FBI and National Defense Department c. FBI and National White Collar Crime Center d. National White Collar Crime Center and National Defense Department
c. FBI and National White Collar Crime Center
Which of the following classifications of viruses can change its own code to avoid detection? a. Stealth b. Multipartite c. Polymorphic d. Worm
c. Polymorphic
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. a. Black-hat b. Gray-hat c. White-hat d. Green-hat
c. White-hat
All of the following are considered cybercrimes, EXCEPT ________. a. identity theft b. non-delivery of merchandise c. theft of a cell phone d. hacking
c. theft of a cell phone
All of the following are the main functions of antivirus software, EXCEPT ________. a. looking for virus signatures b. quarantining viruses c. inoculating key files d. assassinating all viruses
d. assassinating all viruses
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. a. use your debit card information to purchase items illegally b. assume your identity c. steal your logon and passwords for various accounts d. launch a denial of service (DoS) attack on your computer
d. launch a denial of service (DoS) attack on your computer
A time bomb is a virus that is triggered when certain conditions are met such as opening a file. true or false
false
A worm infects a host file and waits for that file to be executed on another computer to replicate. true or false
false
All viruses cause serious destruction of computer data. false or true
false
All viruses cause serious destruction of computer data. true or false
false
Hackers most often obtain access to someone's computer via direct access. true or false
false
The only way your identity can be stolen is by a computer. true or false
false
The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. true or false
false
Theft of a tablet is considered cybercrime. false or true
false
Theft of a tablet is considered cybercrime. true or false
false
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. true or false
true
A virus signature is a portion of virus code that is unique to a particular computer virus. false or true
true
A virus signature is a portion of virus code that is unique to a particular computer virus. true or false
true
Creating and spreading online viruses is a cybercrime. true or false
true
Ethical hackers are also known as white-hat hackers. true or false
true
In 1999, the Melissa virus became the first major macro virus to cause problems worldwide. true or false
true
To create a secure password, you should use both uppercase and lowercase letters. true or false
true