CIS 101 Ch 9 Part IV Final Exam
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
A denial-of-service attack can be used to deny hackers access to a computer system.
false
Since you can always redownload program files, you do not need to include them in backups.
false
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
firewall
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
grey
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
incremental
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. assume your identity use your debit card information to purchase items illegally launch a denial of service (DoS) attack on your computer steal your logons and passwords for various accounts
launch a denial of service (DoS) attack on your computer
A ________ is a virus that is attached to documents.
macro virus
All of the following are top cybercrimes reported to the IC3 EXCEPT ________. identity theft malware fraud non-auction scam advance fee fraud
malware fraud
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
multipartite
Another name for a sniffer is a(n) ________ analyzer.
packet
Government impersonation scams involve ________.
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
All of the following activities may infect your computer with a virus EXCEPT ________. downloading video files from peer-to-peer sites sharing flash drives printing a document downloading or running an e-mail attachment file
printing a document
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
rootkit
A(n) ________ virus is a series of commands that is executed without your knowledge.
script
A(n) ________ can help block unwanted, unsolicited e-mail.
spam filter
One type of CAPTCHA is ________.
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
A macro virus is a virus that is attached to a file.
true
A time bomb virus can be triggered on a certain date.
true
A virus signature is a portion of virus code that is unique to a particular computer virus.
true
A worm does NOT require human interaction to spread to other computers.
true
Creating and spreading online viruses is a cybercrime.
true
Match each of the following terms to its meaning: I. packet filtering II. IP address III. firewall IV. CAPTCHA V. biometric authentication device A. program that generates distorted text and requires that it be typed into a box B. reads a unique personal characteristic and converts its pattern to a digital code C. hardware or software for protecting computers from hackers D. a computer's identity on the Internet E. method for selectively allowing certain requests to access ports
Selected Answer: E, D, C, A, B
Match each of the following terms to its meaning: I. Trojan horse II. pretexting III. cookie IV. botnet V. time bomb A. text file for storing personal preferences pertaining to websites B. program that appears to be something useful or desirable C. virus that is triggered by the passage of time or on a certain date D. creating a scenario that sounds legitimate enough that someone will trust you E. programs that run on a large number of zombie computers
B, D, A, E, C
Match each of the following terms to its meaning: I. grey-hat hacker II. black-hat hacker III. cyberloafing IV. social engineering V. white-hat hacker A. techniques used to manipulate people into performing actions or divulging confidential information B. an unethical hacker C. flaunts expertise to the administrator of a system D. an ethical hacker E. using an employer's computer for non-work activities
C, B, E, A, D
All viruses cause serious destruction of computer data.
False
A whole-house surge protector is installed ________.
at the breaker panel
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
attachments
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
Creating and distributing ________ is one of the most widespread types of cybercrimes.
computer viruses