CIT Chapter 9 quiz

Ace your homework & exams now with Quizwiz!

____ foloods a computer with requests until it shots down and refuses to answer any requests for information

A DDoS attack

Which of these is information that you do Not need to hide from identity thieves?

Anniversary

All of the following are the main functions of antivirus software, Except ____

Assassinating all viruses

Using a ____, hackers can access and delete all files on your computer, send e-mail, run programs.

Backdoor program

What do you call a device that allows you fingerprint or face to be used for authentication?

Bio-metric device

____ viruses are often transmitted by a flash drive left in a USB prot

Boot-sector

Programs that run on a large number of zombie computers

Botnet

Creating and disseminating ____ is one of the most widespread types of cybercrimes

Computer viruses

Which of the following is formally defined as any Criminal action perpetrated primarily though the use of a computer?

Cybercrime

Phishing is typically perpetrated by:

Email

Which of these passwords is most important?

Email

Antivirus software will stop all viruses

False

Hackers most often obatin access to someone's computer via direct access

False

If an email appears to come from a friend or co-worker it cannot be a phishing attempt?

False

It is a good idea to construct just one strong password for every web site you access

False

The only way you identity can be stolen is by a computer.

False

A ____ prevents intrusion into your computer

Firewall

Which kind of hacker breaks into systems just to show the system administrator that they can?

Grey-hat

Which of the following is the best password?

Heiress-tacky-keep-soignee-excise

Which kind of backup backs up on the files that changed since the last backup?

Incremental

A ____ is a virus that is triggered on a certain date

Logic bomb

Virtual, not physical, communication gateway that allow a computer to organize requests for information from other networks or computers are called ____

Logical port

A ____ is a virus that is attached to documents such as word or Excel filles

Macro virus

The most likely method a hacker would use to access a computer is

Overhearing your password and/or log-on information

Which of the following is the number one threat on the internet?

Phishing

With regard to computer protection, quarantining, is defined as ____

Placing a found virus in a secure area on the hard drive

A ____ virus change its own code or periodically rewrite itself to avoid detection

Polymorphic

All of the following activities may infect your computer with a virus Excepy ____

Printing a document

What kind of program allows someone to take almost complete control of your computer?

Rootkit

____ makes broadband users more vulnerable to attacks

Static adressing

Which of these is the strongest indication that can email is a phishing attempt?

The UL does not appear to be legitimale

What is CAPCHAT?

The way hard-to-read letter and number sequence that you type to prove that are human to a website

All of the following are considered cybercrimes, Except ____

Theft of a cell phone

The Net Neutrality rules recently approved by the Federal Communications Commission (FCC) included the following: no blocking, no paid prioritization, and no ____

Throtting

A macro virus is a virus that is attached to a file such as a word document or Excel workbook

True

Which method is a good way to remember all the different passwords I use on web sites?

Use a password manager

A ____ is a secure internet pathway that encrypts all data between two computers

VPN

What do you call a secure network that uses the Internet infrastructure?

VPN

A(n) ____ is the portion of virus code that is unique to particular computer virus

Virus signature

Which kind of hacking is legal

White-Hat

Which of these emails is most likely legitimate, and not a phishing attempt?

You receive an email notifying you of a change in a company's Online Access Agreement. It states that you do not need to take any action, but provides two links for further information.

Which of the following is the strongest password?

zXg.rv6&ah


Related study sets

SIE - Chapter 6 Federal Regulations

View Set

MANA3335 MindTap Assignment: Chapter 12: Communication in Organizations

View Set

Client Invesment Recommendations

View Set

Business Ethics and Organizational Culture

View Set

COM 110 A01 Midterm/Final Review

View Set

Male Reproductive and Genitourinary Tumors

View Set

Cardiovascular Medications NCLEX

View Set

Northwestern Mutual Life Insurance Exam

View Set