(CIS 100) Testbank Questions: Threats to Your Digital Life over Chapter 9
Packet Sniffer
A program that examines the contents of all network traffic.
Polymorphic virus
A virus that changes its own code to avoid detection.
Trojan horse
Appears to be useful but does something malicious in the background.
Multi - partite virus
Attempts to infect computers through multiple methods.
Worm
Attempts to travel between systems through network connections to spread an infection
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) _____________ .
Black - hat hacker
The most common occurrence of identity compromise is through _________ .
Data breaches of a company that stores your information
All of the following pieces of information should be highly guarded while using a public Wi- Fi hotspot, EXCEPT ________ .
First Name
A(n) ________ is a program that analyzes the contents of data packets on a network.
Hacker
Anyone who breaks into a computer system is known as a(n) __________ .
Hacker
______ is software that has a malicious intent.
Malware
______ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Pharming
Which of the following virus types changes its own code to avoid detection?
Polymorphic
___________ are new browser windows launched by a website.
Pop- Ups
___________ tries to convince you that your computer is infected.
Scareware
A virus hidden in a website is known as a(n) ________ .
Script
__________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Script
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) __________ virus.
Stealth
Which of the following statements is NOT true about identity theft?
Thieves can easily defeat 2 factor authentication
A(n) _________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
Trojan Horse
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) __________ .
White - hat hacker
Which of the following are considered slightly different from viruses because they can run without user interaction?
Worms
Taking someone's personal information and posing as that person for financial or legal transactions is known as _______ .
identity Theft
These are all important protective measures for preventing viruses EXCEPT ________ .
not using Wi - Fi hotspots