Chapter 9
BLANK floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which type of virus was the famous Michelangelo virus?
A time bomb
Which is NOT one of the four key pieces of personal information you should protect from identity thieves?
Anniversary
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Cybercrime
The Internet Crime Complaint Center (IC3) is a partnership between the BLANK
FBI and National White Collar Crime Center
Which of the following is NOT a virus category?
Pharming
Which of the following classifications of viruses can change its own code to avoid detection?
Polymorphic
BLANK is a program that gathers information about your surfing habits without your knowledge.
Spyware
BLANK hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
White-hat
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing BLANK.
a firewall
Creating and distributing BLANK is one of the most widespread types of cybercrimes.
computer viruses
Using your computer for non-work activities while you are being paid to work is known as BLANK.
cyberloafing
Social BLANK is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
A denial-of-service attack can be used to deny hackers access to a computer system.
false
A stealth virus is designed to infect multiple file types to fool the antivirus software.
false
All viruses cause serious destruction of computer data.
false
An encryption virus replicates itself onto a hard drive's master boot record.
false
Currently, there are no antivirus programs for mobile devices.
false
Since you can always redownload program files, you do not need to include them in backups.
false
The terms virus and worm mean the same thing.
false
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
false
You should use the same password for each system or website you need to access.
false
A virus signature is a portion of virus code that is unique to a particular computer virus.
fasle
In computing, a BLANK is named after a housing construction feature that slows the spread of fires from house to house.
firewall
Viruses, adware, and spyware are referred to collectively as BLANK.
grayware
Rules for creating passwords include all of the following EXCEPT BLANK.
keep a master password that is the same for all of your accounts
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT BLANK.
launch a denial of service (DoS) attack on your computer
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as BLANK.
logical port blocking
A BLANK is a virus that is attached to documents such as Word or Excel files.
macro virus
All of the following are top cybercrimes reported to the IC3 EXCEPT BLANK
malware fraud
Government impersonation scams involve BLANK
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as BLANK.
pharming
Regarding computer protection, quarantining is defined as BLANK.
placing a found virus in a secure area on the hard drive
All of the following activities may infect your computer with a virus EXCEPT BLANK
printing a document
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
rootkit
CAPTCHA is ________.
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
A BLANK is a virus that is triggered on a certain date.
time bomb
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook
true
A time bomb virus can be triggered on a certain date.
true
A worm does NOT require human interaction to spread to other computers.
true
Creating and spreading online viruses is a cybercrime
true
Ethical hackers are also known as white-hat hackers.
true
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
true
A(n) BLANK is the portion of virus code that is unique to a particular computer virus.
virus signature
A(n) BLANK takes advantage of file transport methods, such as e-mail, to spread on its own.
worm