Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

BLANK floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which type of virus was the famous Michelangelo virus?

A time bomb

Which is NOT one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

The Internet Crime Complaint Center (IC3) is a partnership between the BLANK

FBI and National White Collar Crime Center

Which of the following is NOT a virus category?

Pharming

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

BLANK is a program that gathers information about your surfing habits without your knowledge.

Spyware

BLANK hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

White-hat

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing BLANK.

a firewall

Creating and distributing BLANK is one of the most widespread types of cybercrimes.

computer viruses

Using your computer for non-work activities while you are being paid to work is known as BLANK.

cyberloafing

Social BLANK is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

A denial-of-service attack can be used to deny hackers access to a computer system.

false

A stealth virus is designed to infect multiple file types to fool the antivirus software.

false

All viruses cause serious destruction of computer data.

false

An encryption virus replicates itself onto a hard drive's master boot record.

false

Currently, there are no antivirus programs for mobile devices.

false

Since you can always redownload program files, you do not need to include them in backups.

false

The terms virus and worm mean the same thing.

false

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

false

You should use the same password for each system or website you need to access.

false

A virus signature is a portion of virus code that is unique to a particular computer virus.

fasle

In computing, a BLANK is named after a housing construction feature that slows the spread of fires from house to house.

firewall

Viruses, adware, and spyware are referred to collectively as BLANK.

grayware

Rules for creating passwords include all of the following EXCEPT BLANK.

keep a master password that is the same for all of your accounts

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT BLANK.

launch a denial of service (DoS) attack on your computer

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as BLANK.

logical port blocking

A BLANK is a virus that is attached to documents such as Word or Excel files.

macro virus

All of the following are top cybercrimes reported to the IC3 EXCEPT BLANK

malware fraud

Government impersonation scams involve BLANK

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as BLANK.

pharming

Regarding computer protection, quarantining is defined as BLANK.

placing a found virus in a secure area on the hard drive

All of the following activities may infect your computer with a virus EXCEPT BLANK

printing a document

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

A BLANK is a virus that is triggered on a certain date.

time bomb

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook

true

A time bomb virus can be triggered on a certain date.

true

A worm does NOT require human interaction to spread to other computers.

true

Creating and spreading online viruses is a cybercrime

true

Ethical hackers are also known as white-hat hackers.

true

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

true

A(n) BLANK is the portion of virus code that is unique to a particular computer virus.

virus signature

A(n) BLANK takes advantage of file transport methods, such as e-mail, to spread on its own.

worm


Ensembles d'études connexes

Chapter 5 Practice Questions APES

View Set

Chapter 12: Schizophrenia and Schizophrenia Spectrum Disorders

View Set

AP Art History Paleolithic and Neolithic Period definitions.

View Set

All 44 Presidents with name, party, and years in office

View Set

Evaluación Elementos de Comunicación

View Set

Diabetes Mellitus Across the Lifespan

View Set