MISY160 Chapter 9

question
D) theft of services
answer
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) theft of services
question
B) Cybercrime
answer
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking
question
C) FBI and National White Collar Crime Center
answer
The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and U.S. Department of Defense
question
A) people pretending to represent official organizations
answer
FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods
question
B) computer viruses
answer
Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies
question
D) pharming
answer
Which of the following is NOT a virus category? A) worm B) logic bomb C) macro D) pharming
question
B) A time bomb
answer
Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus
question
A) worm
answer
A(n) ________ takes advantage of file transport methods to spread on its own. A) worm B) script virus C) encryption virus D) macro virus
question
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
answer
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
question
C) Polymorphic
answer
Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm
question
B) placing a found virus in a secure area on the hard drive
answer
With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file
question
A) virus signature
answer
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern
question
C) White-hat
answer
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat
question
D) rootkit
answer
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit
question
B) a firewall
answer
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software
question
D) logical port blocking
answer
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking
question
C) use a dictionary to find a lengthy word that is easy to remember
answer
Rules for creating passwords include all of the following EXCEPT ________. A) keep your password a secret B) change your password frequently C) use a dictionary to find a lengthy word that is easy to remember D) use letters, numbers and symbols in your passwords
question
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
answer
) CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
1 of

Unlock all answers in this set

Unlock answers
question
D) theft of services
answer
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) theft of services
question
B) Cybercrime
answer
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking
question
C) FBI and National White Collar Crime Center
answer
The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and U.S. Department of Defense
question
A) people pretending to represent official organizations
answer
FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods
question
B) computer viruses
answer
Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies
question
D) pharming
answer
Which of the following is NOT a virus category? A) worm B) logic bomb C) macro D) pharming
question
B) A time bomb
answer
Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus
question
A) worm
answer
A(n) ________ takes advantage of file transport methods to spread on its own. A) worm B) script virus C) encryption virus D) macro virus
question
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
answer
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
question
C) Polymorphic
answer
Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm
question
B) placing a found virus in a secure area on the hard drive
answer
With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file
question
A) virus signature
answer
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern
question
C) White-hat
answer
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat
question
D) rootkit
answer
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit
question
B) a firewall
answer
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software
question
D) logical port blocking
answer
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking
question
C) use a dictionary to find a lengthy word that is easy to remember
answer
Rules for creating passwords include all of the following EXCEPT ________. A) keep your password a secret B) change your password frequently C) use a dictionary to find a lengthy word that is easy to remember D) use letters, numbers and symbols in your passwords
question
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
answer
) CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New