Final Chap 9 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The terms virus and worm actually mean the same thing.
answer
false
question
An encryption virus replicates itself onto a hard drive's master boot record.
answer
false
question
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
answer
true
question
Ethical hackers are also known as white-hat hackers.
answer
true
question
You should use the same password for each system or website you need to access.
answer
false
question
Creating and spreading online viruses is a cybercrime.
answer
true
question
All viruses cause serious destruction of computer data.
answer
false
question
A virus signature is a portion of virus code that is unique to a particular computer virus.
answer
true
question
Currently, there are no antivirus programs for mobile devices.
answer
false
question
A zombie is another person's computer controlled by a hacker.
answer
true
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
answer
a personal firewall
question
________ is a program that gathers information about your surfing habits without your knowledge.
answer
Spyware
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
answer
rootkit
question
Rules for creating passwords include all of the following EXCEPT ________.
answer
use a dictionary to find a lengthy word that is easy to remember
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations such as the Dept. of Homeland Security
question
Creating and distributing ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
________ viruses are often transmitted by a flash drive left in a USB port.
answer
Boot-sector
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive.
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
CAPTCHA stands for ________.
answer
Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
Which type of virus was the famous Michelangelo virus?
answer
A time bomb