TIA Chapter 9 – Flashcards with Answers
Unlock all answers in this set
Unlock answersquestion
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as 1. malware theft. 2. scareware theft. 3. identity theft. 4. impersonation theft.
answer
3. identity theft
question
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack. 1. scareware 2. denial-of-service 3. backdoor 4. stealth
answer
2. denial-of-service
question
A series of commands that are executed without your knowledge is a typical attribute of a ___________ virus. 1. encryption 2. time bomb 3. boot-sector 4. script
answer
4. script
question
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as 1. adware 2. spyware. 3. scareware. 4. trackingware.
answer
3. scareware
question
A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as 1. logic bombing. 2. keystroke logging. 3. spear phishing. 4. pretexting.
answer
3. spear phishing
question
Firewalls work by closing ____ in your computer 1. backdoors 2. software gaps 3. logical ports 4. logical doors
answer
3. logical ports
question
________ involve using a physical attribute such as a fingerprint for authentication. 1. Biometrics 2. Backdoors 3. Trojan horses 4. Rootkits
answer
1. Biometrics
question
A backup of only the files on your computing device that have been created (or changed) since the last backup is known as a(n) 1. total backup. 2. global backup. 3. image backup. 4. incremental backup.
answer
4. incremental backup
question
Antivirus software looks for _________ to detect viruses in files. 1. virus VPNs. 2. virus bots. 3. virus signatures. 4. virus artifacts.
answer
3. virus signatures
question
Updating your operating software on a regular basis helps prevent system corruption from ______, which are malicious websites downloading harmful software to your computer. 1. CAPTCHA 2. phishing 3. drive-by-downloads 4. pharming
answer
3. drive-by-downloads
question
Which of the following is NOT a major type of cybercrime reported to the IC3? 1. identity theft 2. malware fraud 3. Government impersonation scams 4. advance fee fraud
answer
2. malware
question
Viruses that load from USB drives left connected to computers when computers are turned on are known as 1. encryption viruses. 2. script viruses. 3. polymorphic viruses. 4. boot-sector viruses.
answer
4. boot-sector viruses
question
Software designed to close logical ports in your computer is known as a(n) 1. firewall. 2. packet filter. 3. network address translator. 4. anti-malware blocker.
answer
1. firewall
question
Which is NOT a tool hackers use to gain access to and take control of your computer? 1. rootkits 2. phishing software 3. Trojan horse 4. backdoor programs
answer
2. phishing software
question
A computer that a hacker has gained control of in order to launch DoS attacks is known as a ________ computer. 1. breached 2. zombie 3. compromised 4. rootkit
answer
2. zombie
question
A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n) 1. image backup. 2. total backup. 3. incremental backup. 4. modification backup.
answer
1. image backup
question
Password strength is solely determined by the length of the password T/F
answer
False
question
One of the best and simplest ways to keep hackers out of your computer is to use a firewall. T/F
answer
True
question
Sending e-mails to lure people into revealing personal information is a technique known as phishing. T/F
answer
True
question
Encrypting data is not an appropriate measure for protecting mobile devices such as smartphones. T/F
answer
False
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. 1. A Trojan horse 2. A DDoS attack 3. A polymorphic virus 4. Pretexting
answer
2. A DDoS attack
question
A(n) ________ takes advantage of file transport methods to spread on its own. 1. macro virus 2. worm 3. encryption virus 4. script virus
answer
2. worm
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? 1. Hacking 2. Social networking 3. Cybercrime 4. Phishing
answer
3. Cybercrime
question
A ________ is named after a housing construction feature that slows the spread of fires from house to house. 1. firebreak 2. firewall 3. firehouse 4. fire extinguisher
answer
2. firewall
question
All of the following activities may infect your computer with a virus EXCEPT ________. 1. downloading or running an e-mail attachment file 2. sharing flash drives 3. downloading video files from peer-to-peer sites 4. printing a document
answer
4. printing a document
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. 1. pretexting 2. engineering 3. theft 4. pharming
answer
2. engineering
question
A ________ is a virus that is triggered on a certain date. 1. macro 2. worm 3. logic bomb 4. time bomb
answer
4. time bomb
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________. 1. FBI and National Defense Department 2. FBI and National White Collar Crime Center 3. National White Collar Crime Center and U.S. Department of Defense 4. FBI and local police departments
answer
2. FBI and National White Collar Crime center
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. 1. logic bomb 2. rootkit 3. denial of service (DoS) 4. zombie
answer
2. rootkit
question
________ viruses are often transmitted by a flash drive left in a USB port. 1. Logic bomb 2. Macro 3. Time bomb 4. Boot-sector
answer
4. Boot-sector
question
FBI-related scams involve ________. 1. convincing people to send money as a "good faith" gesture 2. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS 3. collecting funds and not delivering the goods 4. running auctions that do not exist
answer
2. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. 1. steal your logons and passwords for various accounts 2. use your debit card information to purchase items illegally 3. launch a denial of service (DoS) attack on your computer 4. assume your identity
answer
3. launch a denial of service (DoS) attack on your computer
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. 1. polymorphing 2. pretexting 3. pharming 4. aphishing
answer
3. pharming
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. 1. Black-hat 2. Green-hat 3. Gray-hat 4. White-hat
answer
4. White-hat
question
CAPTCHA is ________. 1. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website 2. antivirus software 3. password method 4. a rootkit virus
answer
1. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
question
Using your computer for non-work activities while you are being paid to work is known as ________. 1. cyberbreaking 2. cyberlazing 3. cyberloafing 4. cybersleeping
answer
cyberloafing
question
Rules for creating passwords include all of the following EXCEPT ________. 1. keep your password a secret 2. change your password frequently 3. use a dictionary to find a lengthy word that is easy to remember 4. use letters, numbers and symbols in your passwords
answer
3. use a dictionary to find a lengthy word that is easy to remember
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. 1. logical port blocking 2. packet filtering 3. static addressing 4. packet switching
answer
1. logical port blocking
question
_______ is a program that gathers information about your surfing habits without your knowledge. 1. Shareware 2. Ghostware 3. Adware 4. Spywar
answer
4. spyware
question
Which type of virus was the famous Michelangelo virus? 1. A worm 2. A script virus 3. An e-mail virus 4. A time bomb
answer
4. time bomb