Filters
Question type

Study Flashcards

A stealth virus is designed to infect multiple file types to fool the antivirus software.

A) True
B) False

Correct Answer

verifed

verified

A virus signature is a portion of virus code that is unique to a particular computer virus.

A) True
B) False

Correct Answer

verifed

verified

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


A) engineering
B) theft
C) pretexting
D) pharming

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.


A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
packet filtering
IP address
CAPTCHA
biometric authentication device
firewall
Responses
a computer's identity on the Internet
hardware or software for protecting computers from hackers
method for selectively allowing certain requests to access ports
program that generates distorted text and requires that it be typed into a box
reads a unique personal characteristic and converts its pattern to a digital code

Correct Answer

packet filtering
IP address
CAPTCHA
biometric authentication device
firewall

A macro virus is a virus that is attached to a file.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is the portion of virus code that is unique to a particular computer virus.


A) virus signature
B) encryption code
C) compression code
D) virus pattern

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.


A) worm
B) script virus
C) encryption virus
D) macro virus

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.


A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

Correct Answer

verifed

verified

encryption...

View Answer

Match each of the following terms to its meaning:

Premises
zombie
rootkit
scareware
spear phishing
spyware
Responses
a computer controlled by a hacker
malware on your computer used to convince you that your computer has a virus
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
program that allows hackers to gain access to your computer without your knowledge
transmits information about you, such as your Internet-surfing habits

Correct Answer

zombie
rootkit
scareware
spear phishing
spyware

Ethical hackers are also known as white-hat hackers.

A) True
B) False

Correct Answer

verifed

verified

Using your computer for non-work activities while you are being paid to work is known as ________.


A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

All of the following are top cybercrimes reported to the IC3 EXCEPT ________.


A) identity theft
B) non-auction scam
C) advance fee fraud
D) malware fraud

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Creating and spreading online viruses is a cybercrime.

A) True
B) False

Correct Answer

verifed

verified

Since you can always redownload program files, you do not need to include them in backups.

A) True
B) False

Correct Answer

verifed

verified

The Internet Crime Complaint Center (IC3) is a partnership between the ________.


A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

All viruses cause serious destruction of computer data.

A) True
B) False

Correct Answer

verifed

verified

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

Correct Answer

verifed

verified

antivirus,...

View Answer

________ is a program that gathers information about your surfing habits without your knowledge.


A) Adware
B) Ghostware
C) Shareware
D) Spyware

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 76

Related Exams

Show Answer