CIT 15 Chapter 9

Ace your homework & exams now with Quizwiz!

Which of the following is NOT a virus category? A) Worm B) Logic bomb C) Macro D) Pharming

D) Pharming

________ is a program that gathers information about your surfing habits without your knowledge. A) Adware B) Ghostware C) Shareware D) Spyware

D) Spyware

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. A) use your debit card information to purchase items illegally B) assume your identity C) steal your logons and passwords for various accounts D) launch a denial of service (DoS) attack on your computer

D) launch a denial of service (DoS) attack on your computer

All of the following are top cybercrimes reported to the IC3 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) malware fraud

D) malware fraud

All of the following activities may infect your computer with a virus EXCEPT ________. A) sharing flash drives B) downloading video files from peer-to-peer sites C) downloading or running an e-mail attachment file D) printing a document

D) printing a document

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit

D) rootkit

A ________ is a virus that is triggered on a certain date. A) worm B) macro C) logic bomb D) time bomb

D) time bomb

You should use the same password for each system or website you need to access.

False

Which of the following is not an example of a factor used in multi-factor authentication?

a captcha

A whole-house surge protector is installed __

at the breker panel

A(n) ____virus replicates itself onto a hard drive's master boot record.

boot-sector

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking

D) logical port blocking

Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies

computer viruses

4)An encryption virus replicates itself onto a hard drive's master boot record.

false

A denial-of-service attack can be used to deny hackers access to a computer system

false

A full backup and an image backup are the same thing.

false

A stealth virus is designed to infect multiple file types to fool the antivirus software.

false

All viruses cause serious destruction of computer data.

false

Currently, there are no antivirus programs for mobile devices.

false

Data breaches are always intentional.

false

Gray-hat hackers are not doing anything illegal.

false

Multi-factor authentication requires three of four possible authentication factors.

false

Since you can always redownload program files, you do not need to include them in backups.

false

The terms virus and worm mean the same thing.

false

Using a backdoor program, you can use your computer while you are away from the office.

false

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

false

full backups back up all your data, but not your applications.

false

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

forensics

Which type of hackers break into systems for the thrill or to show off their skills.

gray hat

Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?

image

A(n) ________ backup makes a copy of all changes since the last backup.

incrmental

31)Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?

multi partie

A macro virus is a virus that is attached to a file.

true

A time bomb virus can be triggered on a certain date.

true

A virus signature is a portion of virus code that is unique to a particular computer virus.

true

A worm does not require human interaction to spread to other computers.

true

An image backup is the same as a system backup.

true

Computer forensics is used to collect evidence for use in courtrooms.

true

Creating and spreading online viruses is a cybercrime.

true

Ethical hackers are also known as white-hat hackers.

true

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.

true

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

true

VPN's allow data to be transmitted on a public network just as securely as on a private network.

true

5)________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

white-hat

Which of the following statements about cookies is NOT true? A) Cookies obtain your personal information by searching your hard drive. B) Cookies are text files. C) Cookies help companies determine the traffic flow through their website. D) Some companies sell the personal information found in cookies to other companies.

A) Cookies obtain your personal information by searching your hard drive.

Using your computer for non-work activities while you are being paid to work is known as ________. A) cyberloafing B) cybersleeping C) cyberlazing D) cyberbreaking

A) cyberloafing

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A) engineering B) theft C) pretexting D) pharming

A) engineering

Government impersonation scams involve ________. A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods

A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern

A) virus signature

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own. A) worm B) script virus C) encryption virus D) macro virus

A) worm

Which is NOT one of the four key pieces of personal information you should protect from identity thieves? A) Social Security number B) Anniversary C) Date of birth D) Street address

B) Anniversary

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software

B) a firewall

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking

B) cybercrime

Viruses, adware and spyware are referred to collectively as ________. A) bloatware B) grayware C) alertware D) firmware

B) greyware

A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse

B) macro virus

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. A) phishing B) pharming C) pretexting D) polymorphing

B) pharming

Regarding computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file

B) placing a found virus in a secure area on the hard drive

Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus

B) time bomb

________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A) A Trojan horse B) A polymorphic virus C) A DDoS attack D) Pretexting

C) A DDoS attack

The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and the IRS B) FBI and the CIA C) FBI and National White Collar Crime Center D) NRA and the U.S. Department of Defense

C) FBI and National White Collar Crime Center

Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm

C) Polymorphic

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. A) firehouse B) firebreak C) firewall D) fire extinguisher

C) firewall

CAPTCHA is ________. A) antivirus software B) a password method C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website D) a rootkit virus

C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website


Related study sets

Chapter 15 Loss Reserving Methods

View Set

ECON 201 Practice Midterm 2 (Chapters 13-18)

View Set

The Cell-an Introduction: Biology

View Set