Chapter 9 Computer Information

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus

A time bomb

________ viruses are often transmitted by a flash drive left in a USB port. A) Logic bomb B) Boot-sector C) Macro D) Encryption

Boot sector

CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

Creating and disseminating ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) fake credit cards D) FBI-related scams

Computer viruses

Which of the following statements about cookies is NOT true? A) Cookies obtain your personal information by searching your hard drive. B) Cookies are text files. C) Cookies help companies determine the traffic flow through their Web site. D) Some companies sell the personal information found in cookies to other companies.

Cookies obtain your personal information by searching your hard drive.

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking

Cybercrime

The protocol using port 53 is ________. A) FTP control B) STMP C) DNS D) HTTP

DNS

IC3 is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and National Defense Department

FBI and National White Collar Crime Center

A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) worm

Macro virus

Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm

Polymorphic

Which of these statements about physically protecting your computer is FALSE? A) The computer should sit on a flat level surface. B) Power surges can be blocked by using a computer surround. C) It is best to unplug computers during an electrical storm. D) Old surge protectors can deliver power to your computer without protecting it.

Power surges can be blocked by using a computer surround.

All of the following are categories of viruses, EXCEPT ________. A) snakes B) boot-sector C) e-mail D) encryption

Snakes

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. A) Spyware Mobile Banking B) Spyeye Mobile Banking C) Spyware Online Banking D) Spyeye Online Banking

Spyeye Mobile Banking

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A) Adware B) Malware C) Shareware D) Spyware

Spyware

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat

White hat

A(n) ________ takes advantage of file transport methods to spread on their own. A) worm B) script C) encryption D) time bomb

Worm

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software

a firewall

All of the following are the main functions of antivirus software, EXCEPT ________. A) looking for virus signatures B) quarantining viruses C) inoculating key files D) assassinating all viruses

assassinating all viruses

All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________. A) identity theft B) non-auction/non-delivery of merchandise C) advance fee fraud D) child pornography

child pornography

Using your computer for non-work activities while you are being paid to do your job is known as ________. A) cyberloafing B) cybersleeping C) cyberlazing D) cyberbreaking

cyberloafing

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A) engineering B) theft C) pretexting D) pharming

engineering

A ________ is named after a housing construction feature that slows the spread of fires from house to house. A) firehouse B) wallfire C) firewall D) fireprotector

firewall

Adware and spyware are referred to collectively as ________. A) viruses B) grayware C) alertware D) firmware

grayware

Rules for creating passwords include all of the following, EXCEPT ________. A) keep your password a secret B) change your password frequently C) keep your password written down and stored in any easy-to-remember location D) create a hard-to-guess password, with a combination of letters, numbers, and symbols

keep your password written down and stored in any easy-to-remember location

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. A) use your debit card information to purchase items illegally B) assume your identity C) steal your logon and passwords for various accounts D) launch a denial of service (DoS) attack on your computer

launch a denial of service (DoS) attack on your computer

All of the following are ways that can infect your computer with a virus, EXCEPT ________. A) sharing flash drives B) downloading video files from peer-to-peer sites C) downloading or running an e-mail attachment file D) logging into e-mail

logging into e-mail

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking

logical port blocking

FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods

people pretending to represent official organizations

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A) phishing B) pharming C) pretexting D) phlying

pharming

With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file

placing a found virus in a secure area on the hard drive

A ________ virus changes its own code or periodically rewrites itself to avoid detection. A) multipartite B) stealth C) polymorphic D) polypertite

polymorphic

All of the following are considered cybercrimes, EXCEPT ________. A) identity theft B) non-delivery of merchandise C) theft of a cell phone D) hacking

theft of a phone call

A ________ is a virus that is triggered on a certain date. A) worm B) script C) logic bomb D) time bomb

time bomb

A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern

virus signature


संबंधित स्टडी सेट्स

Programming for Everybody - Python - Coursera (Module 1)

View Set

INQR 101 Quiz: Academic Journals andEvaluating Sources

View Set

Nutrition Chapter 3 Terms and Questions

View Set

DOCUMENTATION: MLA-Style Works Cited

View Set