Computer in Society: Chapter 9 Final Exam Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

A ___________ virus is a series of commands that is executed without your knowledge

script

Unwanted, unsolicited e-mail is referred to as ________.

spam

A(n) ________ can help block unwanted, unsolicited e-mail.

spam filter

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.

stealth

A(n) ________ protects a computer against power surges.

surge protector

Which type of virus was the famous Michelangelo virus?

time bomb

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

Another name for bots is _________

web robots

A(n) ________ takes advantage of file transport methods to spread on its own.

worm

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

________ occur when a website downloads harmful software onto your computer.

Drive-by downloads

A denial-of-service attack can be used to deny hackers access to a computer system.

FALSE

A stealth virus is designed to infect multiple file types to fool the antivirus software.

FALSE

All viruses cause serious destruction of computer data.

FALSE

An encryption virus replicates itself onto a hard drive's master boot record.

FALSE

Currently, there are no antivirus programs for mobile devices.

FALSE

Since you can always redownload program files, you do not need to include them in backups.

FALSE

The terms virus and worm actually mean the same thing

FALSE

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure

FALSE

You should use the same password for each system or website you need to access.

FALSE

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

FBI and National White Collar Crime Center

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

Phishing

________ is malware that tries to convince you that your computer is infected with a virus.

Scareware

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

TRUE

A time bomb virus can be triggered on a certain date.

TRUE

A virus signature is a portion of virus code that is unique to a particular computer virus.

TRUE

A worm does NOT require human interaction to spread to other computers.

TRUE

Creating and spreading online viruses is a cybercrime.

TRUE

Ethical hackers are also known as white-hat hackers.

TRUE

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

TRUE

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

a firewall

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing _______

a firewall

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

antivirus

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

attachments

All of the following activities may infect your computer with a virus EXCEPT __________

printing a document

One way to protect your personal information on Facebook is to change your __________ settings.

privacy

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

biometric

A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

botnet

Creating and distributing ____ is one of the most widespread types of cyber crimes.

computer viruses

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

encryption

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

Viruses, adware and spyware are referred to collectively as ______

grayware

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator

grey

Victims of ______ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts

identity theft

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

incremental

During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

inoculation

Rule of creating passwords include all of the following EXCEPT

keep a master password that is the same for all of your accounts

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT

launch a denial of service (DoS) attack on your computer

All of the following were top cybercrimes reported to the IC3 EXCEPT ________.

malware fraud

_________ alarm software is an inexpensive theft deterrent for mobile devices

motion

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

multipartite

Another name for a sniffer is a(n) ________ analyzer.

packet

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

The most common kind of pretexting in cyberspace is ________.

phishing

Which of the following classifications of viruses can change its own code to avoid detection?

polymorphic


Ensembles d'études connexes

Chapter 14 Exam II Test Bank Part 1 (C)

View Set

EAQ Nursing Process - Evaluation

View Set

EMT Chapter 31 Orthopaedic Injuries

View Set

Human Resource Management exam 2

View Set

practice questions chapter 11 & 12

View Set

***Legal Environment of Business Chapter 1-5 Test, *Legal Environment of Business Chapter 1-6 Test, BusAd 2900 - Ch. 9 Legal Environment of Business (text: Melvin, Guerra-Pujol), Bu...

View Set

Textbook questions MGMT 4000 exaam #3

View Set

psychology chapter 5, 6, 7, 9 questions

View Set

Business Ethics Final Dash Spring 2021 ORU

View Set