Chapter 9 Practice Multiple Choice – Flashcards

Unlock all answers in this set

Unlock answers
question
White-hat
answer
_____ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
question
Cyberloafing
answer
Using your computer for non-work activities while you are being paid to work is known as ______.
question
Time bomb
answer
A ______ is a virus that is triggered on a certain date.
question
A firewall
answer
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ______.
question
FBI and National White Collar Crime Center
answer
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
question
Boot-sector
answer
_______ viruses are often transmitted by a flash drive left in a USB port.
question
Launch a denial of service (DoS) attack on your computer
answer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT _______.
question
Theft of services
answer
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ______.
question
Computer viruses
answer
Creating and distributing ____ is one of the most widespread types of cyber crimes.
question
Completely Automated Public Turing Test to Tell Computers and Humans Apart
answer
CAPTCHA stands for ______.
question
Firewall
answer
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
question
Use a dictionary to find a lengthy word that is easy to remember
answer
Rules for creating passwords include all of the following EXCEPT ______.
question
Spyware
answer
_______ is a program that gathers information about your surfing habits without your knowledge.
question
Polymorphic
answer
Which of the following classifications of viruses can change its own code to avoid detection?
question
Cybercrime
answer
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
question
Worm
answer
A ______ takes advantage of file transport methods to spread on its own.
question
Pharming
answer
Which of the following is NOT a virus category?
question
Pharming
answer
When malicious code is planted on your computer and alters your browsers ability to find web addresses, it is known as _______.
question
Rootkit
answer
A _______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
question
Placing a found virus in a secure area on the hard drive
answer
With regard to computer protection, quarantining is defined as _________.
question
Cookies obtain your personal information by searching your hard drive
answer
Which of the following statements about cookies is NOT true?
question
Engineering
answer
Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
question
Installing a manufacturers printer driver
answer
All of the following are ways that can infect your computer with a virus EXCEPT _______.
question
A DDoS attack
answer
_______ floods a computer with requests until it shuts down and refuses to answer any requests for information.
question
Virus signature
answer
A ________ is the portion of virus code that is unique to a particular computer virus.
question
A time bomb
answer
Which type of virus was the famous Michelangelo virus?
question
People pretending to represent official organizations
answer
FBI-related scams involve ______.
question
Macro virus
answer
A _______ is a virus that is attached to documents such as word or excel files.
question
Logical port blocking
answer
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as _____.
question
Grayware
answer
Adware and spyware are referred to collectively as _______.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New