Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which type of virus was the famous Michelangelo virus?

A time bomb

Which is not one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

FBI and National White Collar Crime Center

Which of the following is NOT a virus category?

Pharming

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

White-hat

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

a firewall

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

firewall

Viruses, adware and spyware are referred to collectively as ________.

grayware

Rules for creating passwords include all of the following EXCEPT ________.

keep a master password that is the same for all of your accounts

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

launch a denial of service (DoS) attack on your computer

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

All of the following are top cybercrimes reported to the IC3 EXCEPT ________.

malware fraud

Government impersonation scams involve ________.

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

Regarding computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

Which of the following classifications of viruses can change its own code to avoid detection?

polymorphic

All of the following activities may infect your computer with a virus EXCEPT ________.

printing a document

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

A ________ is a virus that is triggered on a certain date.

time bomb

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

worm


Ensembles d'études connexes

Mircroecon Chapter 5: Elasticity

View Set

FCC GROL Element 3 (Part 1 of 2)

View Set

Consumer-focused strategies: Segmentation

View Set

OBGYN- Chapter 19: The Menstrual Cycle

View Set