MISY chapter 9
_____ viruses are often transmitted by a flash drive left in a USB port.
Boot-sector
CAPTCHA stands for _______
Completely Automated Public Turing Test to Tell Computers and Humans Apart
The protocol using port 53 is
DNS
IC3 is a partnership between
FBI and National White Collar Crime Center
Which of the following classifications of viruses can change its own code to avoid detection?
Polymorphic
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround
One virus called ____ is used to trick users into downloading an infected file to their phone, which steals online banking information.
Spyeye Mobile Banking
_______ floods a computer with requests until it shuts own and refuses to answer any requests for information
a DDoS attack
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing
a firewall
Which type of virus was the famous Michelangelo virus?
a time bomb
All of the following are the main functions of antivirus software, EXCEPT
assassinating all viruses
All of the following are top cyber crimes reported to the IC3 in 2011, except
child porn
Creating and disseminating ________ if one of the most widespread types of cybercrimes.
computer viruses
Which of the folioing statements about cookies is NOT true?
cookies obtain your personal information by searching your hard drive
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer
cybercrime
Using your computer for non work activities while you are being paid to do a job is known as
cyberloafing
Social ________ is named after a housing construction feature that slows the spread of fires from house to house
engineering
Named after a housing construction feature that slows the spread of fires from house to houes
firewall
Adware and spyware are referred to collectively as _______.
grayware
Rules for creating passwords include all of the following, EXCEPT
keep your password written down and stored in any easy-to-remember location
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT
launch a denial of service (DoS) attack on your computer
All of the following are ways that can infect your computer with a virus, EXCEPT
logging into email
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as
logical port blocking
A _____ is a virus that is attached to documents such as Word or Excel files.
macro virus
FBI related scams involve
people pretending to represent official organizations
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as
pharming
With regard to computer protection, quarantining is defined as
placing a found virus in a secure area on the hard drive
A virus that changes its own code or periodically rewrites itself to avoid detection.
polymorphic
All of the folioing are categories of viruses, EXCEPT
snakes
An unwanted piggyback program that usually downloads with software you are installing from the Internet
spyware
All of the following are considered cybercrimes, EXCEPT
theft of a cell phone
A ____ is a virus that is triggered on a certain date.
time bomb
A(n) ____ is the portion of virus code that is unique to a particular computer virus
virus signature
Hackers that break into systems for non-malicious reasons such as to test system security vulnerabilities
white-hat
A(n) ________ takes advantage of file transport methods to spread on their own.
worm