ITM chapter 9
rootkit
A __________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge -logic bomb -rootkit -zombie -denial of service (DoS)
time bomb
A __________ is a virus that is triggered on a certain date -macro -time bomb -worm -logic bomb
macro virus
A ___________ is a virus that is attached to documents -script virus -Trojan horse -polymorphic virus -macro virus
launch a denial of service (DoS) attack on your computer
A packet analyzer is a program that can enable a hacker to do all of the following except -launch a denial of service (DoS) attack on your computer -use your debit card information to purchase items illegally -assume your identity -steal your logons and passwords for various accounts
virus signature
A(n) __________ is the portion of virus code that is unique to a particular computer virus -virus pattern -encryption code -virus signature -compression code
worm
A(n) _____________ takes advantage of file transport methods, such as e-mail, to spread on its own -macro virus -script virus -worm -encryption virus
printing a document
All of the following activities may infect your computer with a virus except -downloading video files from peer-to-peer sites -sharing flash drives -printing a document -downloading or running an e-mail attachment file
malware fraud
All of the following are top cybercrimes reported to the IC3 except -advance fee fraud -malware fraud -non-auction scam -identity theft
logical port blocking
Configuring a firewall to ignore all incoming packets, that request access to a specific port is known as -packet filtering -logical port blocking -packet switching -static addressing
computer viruses
Creating and distributing ___________ is one of the most widespread types of cybercrimes -zombies -spam -cookies -computer viruses
false
Currently, there are no antivirus programs for mobile devices -true -false
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
Government impersonation scams involve -convincing people to send as a "good faith" gesture -collecting funds and not delivering the goods -people pretending to represent official organizations such as the Dept. of Homeland Security or IRS -running auctions that do not exist
Worm - attempts to travel between systems through network connections to spread an infection Computer Virus - program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files Encryption Virus - a program that renders your computer files unusable by compressing them Plymorphic Virus - virus that changes its own code to avoid detection Logic Bomb - virus that is triggered when a file is opened or program is started a certain number of times
Match each of the following terms to its meaning: worm computer virus encryption virus polymorphic virus logic bomb
keep a master password that is the same for all of your accounts
Rules for creating passwords include all of the following except -change your password frequently -keep a master password that is the same for all of your accounts -use letters, numbers, and symbols in your passwords -keep your password a secret
engineering
Social ____________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information -theft -pharming -engineering -pretexting
engineering
Social _____________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the -FBI and National White Collar Crime Center -FBI and the CIA -NRA and the U.S. Department of Defense -FBI and the IRS
cyberloafing
Using your computer for non-work activities while you are being paid to work is known as -cyberlazing -cybersleeping -cyberloafing -cyberbreaking
grayware
Viruses, adware, and spyware are referred to collectively as -bloatware -alertware -grayware -firmware
pharming
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as -pretexting -pharming -polymorphing -phishing
anniversary
Which is not one of the four key pieces of personal information you should protect from identity thieves? -Social Security number -Street address -Date of birth -Anniversary
Polymorphic
Which of the following classifications of viruses can change its own code to avoid detection? -Stealth -Mulipartite -Polymorphic -Worm
cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? -phishing -social networking -hacking -cybercrime
pharming
Which of the following is not a virus category? -Macro -Logic bomb -Pharming -Worm
cookies obtain your personal information by searching your hard drive
Which of the following statements about cookies is not true? -cookies are text files -some companies sell the personal information found in cookies to other companies -cookies help companies determine the traffic flow through their website -cookies obtain your personal information by searching your hard drive
a time bomb
Which type of virus was the famous Michelangelo virus? -a time bomb -a script virus -a worm -an e-mail virus
a firewall
You can block logical ports form invaders and make your computer invisible to others on the Internet by installing -a packet filter -antivirus software -a packet sniffer -a firewall
spyware
__________ is a program that gathers information about your surfing habits without your knowledge -adware -ghostware -spyware -shareware
a DDoS attack
____________ floods a computer with requests until it shuts down and refuses to answer any requests for information -a polymorphic virus -a Trojan horse -a DDoS attack -pretexting
white-hat
____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities -green-hat -grey-hat -white-hat -black-hat