CIS 101 Ch 9 Part IV Final Exam

Ace your homework & exams now with Quizwiz!

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

A denial-of-service attack can be used to deny hackers access to a computer system.

false

Since you can always redownload program files, you do not need to include them in backups.

false

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

firewall

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

grey

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

incremental

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. assume your identity use your debit card information to purchase items illegally launch a denial of service (DoS) attack on your computer steal your logons and passwords for various accounts

launch a denial of service (DoS) attack on your computer

A ________ is a virus that is attached to documents.

macro virus

All of the following are top cybercrimes reported to the IC3 EXCEPT ________. identity theft malware fraud non-auction scam advance fee fraud

malware fraud

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

multipartite

Another name for a sniffer is a(n) ________ analyzer.

packet

Government impersonation scams involve ________.

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

All of the following activities may infect your computer with a virus EXCEPT ________. downloading video files from peer-to-peer sites sharing flash drives printing a document downloading or running an e-mail attachment file

printing a document

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

A(n) ________ virus is a series of commands that is executed without your knowledge.

script

A(n) ________ can help block unwanted, unsolicited e-mail.

spam filter

One type of CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

A macro virus is a virus that is attached to a file.

true

A time bomb virus can be triggered on a certain date.

true

A virus signature is a portion of virus code that is unique to a particular computer virus.

true

A worm does NOT require human interaction to spread to other computers.

true

Creating and spreading online viruses is a cybercrime.

true

Match each of the following terms to its meaning: I. packet filtering II. IP address III. firewall IV. CAPTCHA V. biometric authentication device A. program that generates distorted text and requires that it be typed into a box B. reads a unique personal characteristic and converts its pattern to a digital code C. hardware or software for protecting computers from hackers D. a computer's identity on the Internet E. method for selectively allowing certain requests to access ports

Selected Answer: E, D, C, A, B

Match each of the following terms to its meaning: I. Trojan horse II. pretexting III. cookie IV. botnet V. time bomb A. text file for storing personal preferences pertaining to websites B. program that appears to be something useful or desirable C. virus that is triggered by the passage of time or on a certain date D. creating a scenario that sounds legitimate enough that someone will trust you E. programs that run on a large number of zombie computers

B, D, A, E, C

Match each of the following terms to its meaning: I. grey-hat hacker II. black-hat hacker III. cyberloafing IV. social engineering V. white-hat hacker A. techniques used to manipulate people into performing actions or divulging confidential information B. an unethical hacker C. flaunts expertise to the administrator of a system D. an ethical hacker E. using an employer's computer for non-work activities

C, B, E, A, D

All viruses cause serious destruction of computer data.

False

A whole-house surge protector is installed ________.

at the breaker panel

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

attachments

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

biometric

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses


Related study sets

psychology quiz questions Matt Tolbert

View Set

World Geography: 5.1, 5.2, & 5.3

View Set

Chapter 32: Assessment of Hematologic Function Questions

View Set

Objective 5: Communication and Organizational Behavior

View Set

DNA- The structure of DNA 12.2 pg 344-348

View Set

chapter 15: EMT: Shock and Resuscitation: Study Guide/Questions

View Set

Area, Surface Area, and Volume Formulas

View Set