Chapter 9 Computer Information
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus
A time bomb
________ viruses are often transmitted by a flash drive left in a USB port. A) Logic bomb B) Boot-sector C) Macro D) Encryption
Boot sector
CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart.
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Creating and disseminating ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) fake credit cards D) FBI-related scams
Computer viruses
Which of the following statements about cookies is NOT true? A) Cookies obtain your personal information by searching your hard drive. B) Cookies are text files. C) Cookies help companies determine the traffic flow through their Web site. D) Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking
Cybercrime
The protocol using port 53 is ________. A) FTP control B) STMP C) DNS D) HTTP
DNS
IC3 is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and National Defense Department
FBI and National White Collar Crime Center
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) worm
Macro virus
Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm
Polymorphic
Which of these statements about physically protecting your computer is FALSE? A) The computer should sit on a flat level surface. B) Power surges can be blocked by using a computer surround. C) It is best to unplug computers during an electrical storm. D) Old surge protectors can deliver power to your computer without protecting it.
Power surges can be blocked by using a computer surround.
All of the following are categories of viruses, EXCEPT ________. A) snakes B) boot-sector C) e-mail D) encryption
Snakes
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. A) Spyware Mobile Banking B) Spyeye Mobile Banking C) Spyware Online Banking D) Spyeye Online Banking
Spyeye Mobile Banking
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A) Adware B) Malware C) Shareware D) Spyware
Spyware
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat
White hat
A(n) ________ takes advantage of file transport methods to spread on their own. A) worm B) script C) encryption D) time bomb
Worm
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software
a firewall
All of the following are the main functions of antivirus software, EXCEPT ________. A) looking for virus signatures B) quarantining viruses C) inoculating key files D) assassinating all viruses
assassinating all viruses
All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________. A) identity theft B) non-auction/non-delivery of merchandise C) advance fee fraud D) child pornography
child pornography
Using your computer for non-work activities while you are being paid to do your job is known as ________. A) cyberloafing B) cybersleeping C) cyberlazing D) cyberbreaking
cyberloafing
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A) engineering B) theft C) pretexting D) pharming
engineering
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A) firehouse B) wallfire C) firewall D) fireprotector
firewall
Adware and spyware are referred to collectively as ________. A) viruses B) grayware C) alertware D) firmware
grayware
Rules for creating passwords include all of the following, EXCEPT ________. A) keep your password a secret B) change your password frequently C) keep your password written down and stored in any easy-to-remember location D) create a hard-to-guess password, with a combination of letters, numbers, and symbols
keep your password written down and stored in any easy-to-remember location
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. A) use your debit card information to purchase items illegally B) assume your identity C) steal your logon and passwords for various accounts D) launch a denial of service (DoS) attack on your computer
launch a denial of service (DoS) attack on your computer
All of the following are ways that can infect your computer with a virus, EXCEPT ________. A) sharing flash drives B) downloading video files from peer-to-peer sites C) downloading or running an e-mail attachment file D) logging into e-mail
logging into e-mail
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking
logical port blocking
FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods
people pretending to represent official organizations
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A) phishing B) pharming C) pretexting D) phlying
pharming
With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file
placing a found virus in a secure area on the hard drive
A ________ virus changes its own code or periodically rewrites itself to avoid detection. A) multipartite B) stealth C) polymorphic D) polypertite
polymorphic
All of the following are considered cybercrimes, EXCEPT ________. A) identity theft B) non-delivery of merchandise C) theft of a cell phone D) hacking
theft of a phone call
A ________ is a virus that is triggered on a certain date. A) worm B) script C) logic bomb D) time bomb
time bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern
virus signature