ITE - Chapter 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

________ floods a computer with requests until it shuts down and refuses to answer any requests for information. a) A Trojan horse b) A polymorphic virus c) A DDoS attack d) Pretexting

A DDoS attack

Which type of virus was the famous Michelangelo virus? a) A worm b) A time bomb c) A script virus d) An e-mail virus

A time bomb

Which is not one of the four key pieces of personal information you should protect from identity thieves? a) Social Security number b) Anniversary c) Date of birth d) Street address

Anniversary

Which of the following statements about cookies is NOT true? a) Cookies obtain your personal information by searching your hard drive. b) Cookies are text files. c) Cookies help companies determine the traffic flow through their website. d) Some companies sell the personal information found in cookies to other companies.

Cookies obtain your personal information by searching your hard drive.

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? a) Social networking b) Cybercrime c) Phishing d) Hacking

Cybercrime

The Internet Crime Complaint Center (IC3) is a partnership between the ________. a) FBI and the IRS b) FBI and the CIA c) FBI and National White Collar Crime Center d) NRA and the U.S. Department of Defense

FBI and National White Collar Center

( True or False) Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

False

(True or False) A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

(True or False) All viruses cause serious destruction of computer data.

False

(True or False) Since you can always redownload program files, you do not need to include them in backups.

False

(True or False) You should use the same password for each system or website you need to access.

False

Which of the following is NOT a virus category? a) Worm b) Logic bomb c) Macro d) Pharming

Pharming

Which of the following classifications of viruses can change its own code to avoid detection? a) Stealth b) Multipartite c) Polymorphic d) Worm

Polymorphic

________ is a program that gathers information about your surfing habits without your knowledge. a) Adware b) Ghostware c) Shareware d) Spyware

Spyware

(True or False) A macro virus is a virus that is attached to a file.

True

(True or False) A worm does NOT require human interaction to spread to other computers.

True

(True or False) Creating and spreading online viruses is a cybercrime

True

(True or False) Ethical hackers are also known as white-hat hackers.

True

(True or False) To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

True

A virus signature is a portion of virus code that is unique to a particular computer virus.

True

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities. a) Black-hat b) Grey-hat c) White-hat d) Green-hat

White-hat

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. a) a packet sniffer b) a firewall c) a packet filter d) antivirus software

a firewall

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. a) firehouse b) firebreak c) firewall d) fire extinguisher

firewall

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. a) packet filtering b) packet switching c) static addressing d) logical port blocking

logical port blocking

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. a) phishing b) pharming c) pretexting d) polymorphing

pharming

Regarding computer protection, quarantining is defined as ________. a) updating your antivirus software b) placing a found virus in a secure area on the hard drive c) repairing an infected file d) deleting an infected file

placing a found virus in a secure area on the hard drive

All of the following activities may infect your computer with a virus EXCEPT ________. a) sharing flash drives b) downloading video files from peer-to-peer sites c) downloading or running an e-mail attachment file d) printing a document

printing a document

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. a) denial of service (DoS) b) zombie c) logic bomb d) rootkit

rootkit

A ________ is a virus that is triggered on a certain date. a) worm b) macro c) logic bomb d) time bomb

time bomb

A(n) ________ is the portion of virus code that is unique to a particular computer virus. a) virus signature b) encryption code c) compression code d) virus pattern

virus signature


Kaugnay na mga set ng pag-aaral

Primary Greatness by Stephen Covey (Concepts)

View Set

Life Insurance and Health Insurance

View Set

Chapter #7 Athletic Training Exam #2

View Set

Thinking Like a Scientist and Engineer (English Only)

View Set

Writing an Argumentative Editorial about Initiating Change, Comparing Accounts of Iqbal's Story, Word Choice and Author's Purpose in Warriors Don't Cry

View Set