Computer in Society: Chapter 9 Final Exam Review
Using your computer for non-work activities while you are being paid to work is known as ________.
cyberloafing
A ___________ virus is a series of commands that is executed without your knowledge
script
Unwanted, unsolicited e-mail is referred to as ________.
spam
A(n) ________ can help block unwanted, unsolicited e-mail.
spam filter
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.
stealth
A(n) ________ protects a computer against power surges.
surge protector
Which type of virus was the famous Michelangelo virus?
time bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
Another name for bots is _________
web robots
A(n) ________ takes advantage of file transport methods to spread on its own.
worm
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
________ occur when a website downloads harmful software onto your computer.
Drive-by downloads
A denial-of-service attack can be used to deny hackers access to a computer system.
FALSE
A stealth virus is designed to infect multiple file types to fool the antivirus software.
FALSE
All viruses cause serious destruction of computer data.
FALSE
An encryption virus replicates itself onto a hard drive's master boot record.
FALSE
Currently, there are no antivirus programs for mobile devices.
FALSE
Since you can always redownload program files, you do not need to include them in backups.
FALSE
The terms virus and worm actually mean the same thing
FALSE
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure
FALSE
You should use the same password for each system or website you need to access.
FALSE
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and National White Collar Crime Center
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Phishing
________ is malware that tries to convince you that your computer is infected with a virus.
Scareware
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
TRUE
A time bomb virus can be triggered on a certain date.
TRUE
A virus signature is a portion of virus code that is unique to a particular computer virus.
TRUE
A worm does NOT require human interaction to spread to other computers.
TRUE
Creating and spreading online viruses is a cybercrime.
TRUE
Ethical hackers are also known as white-hat hackers.
TRUE
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
TRUE
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
a firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing _______
a firewall
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
antivirus
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
attachments
All of the following activities may infect your computer with a virus EXCEPT __________
printing a document
One way to protect your personal information on Facebook is to change your __________ settings.
privacy
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
botnet
Creating and distributing ____ is one of the most widespread types of cyber crimes.
computer viruses
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
Viruses, adware and spyware are referred to collectively as ______
grayware
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator
grey
Victims of ______ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts
identity theft
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
incremental
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
Rule of creating passwords include all of the following EXCEPT
keep a master password that is the same for all of your accounts
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT
launch a denial of service (DoS) attack on your computer
All of the following were top cybercrimes reported to the IC3 EXCEPT ________.
malware fraud
_________ alarm software is an inexpensive theft deterrent for mobile devices
motion
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
multipartite
Another name for a sniffer is a(n) ________ analyzer.
packet
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
pharming
The most common kind of pretexting in cyberspace is ________.
phishing
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic