CIT Chapter 9 quiz
____ foloods a computer with requests until it shots down and refuses to answer any requests for information
A DDoS attack
Which of these is information that you do Not need to hide from identity thieves?
Anniversary
All of the following are the main functions of antivirus software, Except ____
Assassinating all viruses
Using a ____, hackers can access and delete all files on your computer, send e-mail, run programs.
Backdoor program
What do you call a device that allows you fingerprint or face to be used for authentication?
Bio-metric device
____ viruses are often transmitted by a flash drive left in a USB prot
Boot-sector
Programs that run on a large number of zombie computers
Botnet
Creating and disseminating ____ is one of the most widespread types of cybercrimes
Computer viruses
Which of the following is formally defined as any Criminal action perpetrated primarily though the use of a computer?
Cybercrime
Phishing is typically perpetrated by:
Which of these passwords is most important?
Antivirus software will stop all viruses
False
Hackers most often obatin access to someone's computer via direct access
False
If an email appears to come from a friend or co-worker it cannot be a phishing attempt?
False
It is a good idea to construct just one strong password for every web site you access
False
The only way you identity can be stolen is by a computer.
False
A ____ prevents intrusion into your computer
Firewall
Which kind of hacker breaks into systems just to show the system administrator that they can?
Grey-hat
Which of the following is the best password?
Heiress-tacky-keep-soignee-excise
Which kind of backup backs up on the files that changed since the last backup?
Incremental
A ____ is a virus that is triggered on a certain date
Logic bomb
Virtual, not physical, communication gateway that allow a computer to organize requests for information from other networks or computers are called ____
Logical port
A ____ is a virus that is attached to documents such as word or Excel filles
Macro virus
The most likely method a hacker would use to access a computer is
Overhearing your password and/or log-on information
Which of the following is the number one threat on the internet?
Phishing
With regard to computer protection, quarantining, is defined as ____
Placing a found virus in a secure area on the hard drive
A ____ virus change its own code or periodically rewrite itself to avoid detection
Polymorphic
All of the following activities may infect your computer with a virus Excepy ____
Printing a document
What kind of program allows someone to take almost complete control of your computer?
Rootkit
____ makes broadband users more vulnerable to attacks
Static adressing
Which of these is the strongest indication that can email is a phishing attempt?
The UL does not appear to be legitimale
What is CAPCHAT?
The way hard-to-read letter and number sequence that you type to prove that are human to a website
All of the following are considered cybercrimes, Except ____
Theft of a cell phone
The Net Neutrality rules recently approved by the Federal Communications Commission (FCC) included the following: no blocking, no paid prioritization, and no ____
Throtting
A macro virus is a virus that is attached to a file such as a word document or Excel workbook
True
Which method is a good way to remember all the different passwords I use on web sites?
Use a password manager
A ____ is a secure internet pathway that encrypts all data between two computers
VPN
What do you call a secure network that uses the Internet infrastructure?
VPN
A(n) ____ is the portion of virus code that is unique to particular computer virus
Virus signature
Which kind of hacking is legal
White-Hat
Which of these emails is most likely legitimate, and not a phishing attempt?
You receive an email notifying you of a change in a company's Online Access Agreement. It states that you do not need to take any action, but provides two links for further information.
Which of the following is the strongest password?
zXg.rv6&ah