chapter 9
the internet crime complaint center (IC3) i a partnership between the ____________.
FBI and national white collar crime center.
______________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
a DDoS attack.
a denial-of-service attack can be used to deny hackers access to a computer system.
false.
a stealth virus is designed to infect multiple file types to fool the antivirus software.
false.
all viruses cause serious destruction of computer data.
false.
an encryption virus replicates itself onto a hard drive's master boot record.
false.
currently, there are no antivirus programs for mobile devices.
false.
since you can always redownload program files, you do not need to include them in backups.
false.
the term virus and worm mean the same thing.
false.
virtual private networks (VPNs) are secure networks that are established without using the public internet infrastructure.
false.
viruses, adware, and spyware are referred to collectively as __________.
grayware.
a(n) ___________ backup makes a copy of all changes since the last backup.
incremental.
configuring a firewall to ignore all incoming packets that request access to a specific port is know as________.
logical port blocking.
configuring a firewall to ignore all incoming packets that request access to a specific port is known as ___________.
logical port blocking.
a ___________ is a virus that is attached to documents.
macro virus.
all of the following are top cybercrimes reported to the IC3 EXCEPT ______________.
malware fraud.
government impersonation scams involve _________.
people pretending to represent official organizations such as the dept. of homeland security or IRS.
when malicious code is planted on your computer and alters your broswer's ability to find web addresses, it is known as __________.
pharming.
when malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ___________.
pharming.
which of the following is NOT a virus category?
pharming.
regarding computer protection, quarantining is defined as ___________.
placing a found virus in a secure area on the hard drive.
which of the following classifications of viruses can change its own code to avoid detection?
polymorphic.
______________ is a program that gathers information about your surfing habits without your knowledge
spyware.
one type of CAPTCHA is __________.
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website.
a ___________ is a virus that is triggered on a certain date.
time bomb.
a time bomb virus can be triggered on a certain date.
true.
a virus signature is a portion of a virus code that is unique to a particular computer virus.
true.
a worm does NOT require human interaction to spread to other computers.
true.
creating and spreading online viruses is a cybercrime.
true.
ethical hackers are also known as white-hat hackers.
true.
to create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
true.
a(n) ____________ is the portion of virus code that is unique to a particular computer virus.
virus signature.
_____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
white-hat.
a(n) ___________ takes advantage of file transport methods, such as email, to spread on its own.
worm.
which is not one of the four key pieces of personal information you should protect from identity thieves?
anniversary.
which of the following statements about cookies is NOT true?
cookies obtain your personal information by searching your hard drive.
which of the following is informally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime.
using your computer for non-work activities while you are being paid to work is known as _______________.
cyberloafing.
all of the following activities may infect your computer with a virus EXCEPT ____________.
downloading or running an email attachment file.
social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering.