Chapter 9 – College
Unlock all answers in this set
Unlock answersquestion
All of the following are top cyber crimes reported to the IC3 in 2012
answer
Identify theft Non-auction scam Advance fee fraud
question
Which of the following is formaly defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
answer
FBI and National White Collar Crime Center
question
FBI-related scams involve_______.
answer
people pretending to represent official gesture
question
Creating and distributing _________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
What are virus categories?
answer
Worm Logic bomb Macro
question
Which type of virus was the famous Michelangelo virus?
answer
a time bomb
question
A(n)______ takes advantage of file transport methods to spread on its own.
answer
worm
question
A _______ is a virus that is attached to documents such as Word or Excel files
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
polymorphic
question
With regard to computer protection, quarantining is defined as _________.
answer
placing a found virus in a secure area on the hard drive
question
A(n) _______ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
_______ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
white-hat
question
A _______ allows a hacker to gain access to your computer and take almost control of it without you knowledge
answer
rootkit
question
You can block logical ports from invaders and make your computer invisible to others on the internet by installing _______.
answer
a firewall
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is know as ______.
answer
logical port blocking
question
Rules for creating passwords include all of the following:
answer
Keep your password a secret Change your password frequently Use letters, numbers, and symbols in your passwords
question
CAPTCHA stands for ______.
answer
Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations
question
Adware and spyware are referred to collectively as ________.
answer
grayware