Chapter 9. Famous michelangelo virus, compress file, IC3, computer crime
Unlock all answers in this set
Unlock answersquestion
Which of the following is NOT a major type of cybercrime reported to the IC3?
answer
malware fraud
question
Viruses that compress files and then demand money to restore them are known as
answer
encryption viruses
question
Software designed to close logical ports in your computer is known as a(n)
answer
firewall.
question
Which tool do hackers use to gain access to and take control of your computer?
answer
backdoor programs
question
A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer.
answer
zombie
question
A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n)
answer
image backup.
question
All of the following were top cybercrimes reported to the IC3 in 2013 EXCEPT ________.
answer
theft of services
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations such as the Dept. of Homeland Security
question
Creating and distributing ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
Which of the following is NOT a virus category?
answer
pharming
question
All of the following activities may infect your computer with a virus EXCEPT ________.
answer
downloading or running an e-mail attachment file
question
________ viruses are often transmitted by a flash drive left in a USB port.
answer
Boot-sector
question
Which type of virus was the famous Michelangelo virus?
answer
A time bomb
question
A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
A(n) ________ takes advantage of file transport methods to spread on its own
answer
worm
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________
answer
launch a denial of service (DoS) attack on your computer
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge
answer
rootkit
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
answer
a personal firewall
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack