ITE - Chapter 9
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. a) A Trojan horse b) A polymorphic virus c) A DDoS attack d) Pretexting
A DDoS attack
Which type of virus was the famous Michelangelo virus? a) A worm b) A time bomb c) A script virus d) An e-mail virus
A time bomb
Which is not one of the four key pieces of personal information you should protect from identity thieves? a) Social Security number b) Anniversary c) Date of birth d) Street address
Anniversary
Which of the following statements about cookies is NOT true? a) Cookies obtain your personal information by searching your hard drive. b) Cookies are text files. c) Cookies help companies determine the traffic flow through their website. d) Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? a) Social networking b) Cybercrime c) Phishing d) Hacking
Cybercrime
The Internet Crime Complaint Center (IC3) is a partnership between the ________. a) FBI and the IRS b) FBI and the CIA c) FBI and National White Collar Crime Center d) NRA and the U.S. Department of Defense
FBI and National White Collar Center
( True or False) Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
False
(True or False) A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
(True or False) All viruses cause serious destruction of computer data.
False
(True or False) Since you can always redownload program files, you do not need to include them in backups.
False
(True or False) You should use the same password for each system or website you need to access.
False
Which of the following is NOT a virus category? a) Worm b) Logic bomb c) Macro d) Pharming
Pharming
Which of the following classifications of viruses can change its own code to avoid detection? a) Stealth b) Multipartite c) Polymorphic d) Worm
Polymorphic
________ is a program that gathers information about your surfing habits without your knowledge. a) Adware b) Ghostware c) Shareware d) Spyware
Spyware
(True or False) A macro virus is a virus that is attached to a file.
True
(True or False) A worm does NOT require human interaction to spread to other computers.
True
(True or False) Creating and spreading online viruses is a cybercrime
True
(True or False) Ethical hackers are also known as white-hat hackers.
True
(True or False) To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
True
A virus signature is a portion of virus code that is unique to a particular computer virus.
True
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities. a) Black-hat b) Grey-hat c) White-hat d) Green-hat
White-hat
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. a) a packet sniffer b) a firewall c) a packet filter d) antivirus software
a firewall
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. a) firehouse b) firebreak c) firewall d) fire extinguisher
firewall
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. a) packet filtering b) packet switching c) static addressing d) logical port blocking
logical port blocking
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. a) phishing b) pharming c) pretexting d) polymorphing
pharming
Regarding computer protection, quarantining is defined as ________. a) updating your antivirus software b) placing a found virus in a secure area on the hard drive c) repairing an infected file d) deleting an infected file
placing a found virus in a secure area on the hard drive
All of the following activities may infect your computer with a virus EXCEPT ________. a) sharing flash drives b) downloading video files from peer-to-peer sites c) downloading or running an e-mail attachment file d) printing a document
printing a document
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. a) denial of service (DoS) b) zombie c) logic bomb d) rootkit
rootkit
A ________ is a virus that is triggered on a certain date. a) worm b) macro c) logic bomb d) time bomb
time bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus. a) virus signature b) encryption code c) compression code d) virus pattern
virus signature