ITM chapter 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

rootkit

A __________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge -logic bomb -rootkit -zombie -denial of service (DoS)

time bomb

A __________ is a virus that is triggered on a certain date -macro -time bomb -worm -logic bomb

macro virus

A ___________ is a virus that is attached to documents -script virus -Trojan horse -polymorphic virus -macro virus

launch a denial of service (DoS) attack on your computer

A packet analyzer is a program that can enable a hacker to do all of the following except -launch a denial of service (DoS) attack on your computer -use your debit card information to purchase items illegally -assume your identity -steal your logons and passwords for various accounts

virus signature

A(n) __________ is the portion of virus code that is unique to a particular computer virus -virus pattern -encryption code -virus signature -compression code

worm

A(n) _____________ takes advantage of file transport methods, such as e-mail, to spread on its own -macro virus -script virus -worm -encryption virus

printing a document

All of the following activities may infect your computer with a virus except -downloading video files from peer-to-peer sites -sharing flash drives -printing a document -downloading or running an e-mail attachment file

malware fraud

All of the following are top cybercrimes reported to the IC3 except -advance fee fraud -malware fraud -non-auction scam -identity theft

logical port blocking

Configuring a firewall to ignore all incoming packets, that request access to a specific port is known as -packet filtering -logical port blocking -packet switching -static addressing

computer viruses

Creating and distributing ___________ is one of the most widespread types of cybercrimes -zombies -spam -cookies -computer viruses

false

Currently, there are no antivirus programs for mobile devices -true -false

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

Government impersonation scams involve -convincing people to send as a "good faith" gesture -collecting funds and not delivering the goods -people pretending to represent official organizations such as the Dept. of Homeland Security or IRS -running auctions that do not exist

Worm - attempts to travel between systems through network connections to spread an infection Computer Virus - program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files Encryption Virus - a program that renders your computer files unusable by compressing them Plymorphic Virus - virus that changes its own code to avoid detection Logic Bomb - virus that is triggered when a file is opened or program is started a certain number of times

Match each of the following terms to its meaning: worm computer virus encryption virus polymorphic virus logic bomb

keep a master password that is the same for all of your accounts

Rules for creating passwords include all of the following except -change your password frequently -keep a master password that is the same for all of your accounts -use letters, numbers, and symbols in your passwords -keep your password a secret

engineering

Social ____________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information -theft -pharming -engineering -pretexting

engineering

Social _____________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information

FBI and National White Collar Crime Center

The Internet Crime Complaint Center (IC3) is a partnership between the -FBI and National White Collar Crime Center -FBI and the CIA -NRA and the U.S. Department of Defense -FBI and the IRS

cyberloafing

Using your computer for non-work activities while you are being paid to work is known as -cyberlazing -cybersleeping -cyberloafing -cyberbreaking

grayware

Viruses, adware, and spyware are referred to collectively as -bloatware -alertware -grayware -firmware

pharming

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as -pretexting -pharming -polymorphing -phishing

anniversary

Which is not one of the four key pieces of personal information you should protect from identity thieves? -Social Security number -Street address -Date of birth -Anniversary

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection? -Stealth -Mulipartite -Polymorphic -Worm

cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? -phishing -social networking -hacking -cybercrime

pharming

Which of the following is not a virus category? -Macro -Logic bomb -Pharming -Worm

cookies obtain your personal information by searching your hard drive

Which of the following statements about cookies is not true? -cookies are text files -some companies sell the personal information found in cookies to other companies -cookies help companies determine the traffic flow through their website -cookies obtain your personal information by searching your hard drive

a time bomb

Which type of virus was the famous Michelangelo virus? -a time bomb -a script virus -a worm -an e-mail virus

a firewall

You can block logical ports form invaders and make your computer invisible to others on the Internet by installing -a packet filter -antivirus software -a packet sniffer -a firewall

spyware

__________ is a program that gathers information about your surfing habits without your knowledge -adware -ghostware -spyware -shareware

a DDoS attack

____________ floods a computer with requests until it shuts down and refuses to answer any requests for information -a polymorphic virus -a Trojan horse -a DDoS attack -pretexting

white-hat

____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities -green-hat -grey-hat -white-hat -black-hat


Set pelajaran terkait

EAQ Morris Chapter 21, Basic Intravenous Calculations - Intermediate Level

View Set

Western Civ Midterm Review-Chapter 3

View Set

Financial Accounting 15th edition Chapter 4-5

View Set

Basic Care and Comfort NCLEX questions

View Set

Adult Health Final Exam Nclex -Review for weeks 4-7

View Set