Ch.9 M13 Concept Check And Quiz

24 July 2022
4.7 (114 reviews)
38 test answers

Unlock all answers in this set

Unlock answers (34)
question
All of the following were top cybercrimes reported to the IC3 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) theft of services
answer
d
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and National Defense Department B) National White Collar Crime Center and U.S. Department of Defense C) FBI and local police departments D) FBI and National White Collar Crime Center
answer
d
question
Creating and distributing ________ is one of the most widespread types of cybercrimes. A) computer viruses B) zombies C) spam D) cookies
answer
a
question
Which of the following is NOT a virus category? A) Pharming B) Macro C) Worm D) Logic bomb
answer
a
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) virus pattern C) compression code D) encryption code
answer
a
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. A) use your debit card information to purchase items illegally B) assume your identity C) steal your logons and passwords for various accounts D) launch a denial of service (DoS) attack on your computer
answer
d
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. a. a packet sniffer b. a firewall c. antivirus software d. a packet filter
answer
b
question
Rules for creating passwords include all of the following EXCEPT ________. A) change your password frequently B) use a dictionary to find a lengthy word that is easy to remember C) use letters, numbers and symbols in your passwords D) keep your password a secret
answer
b
question
Adware and spyware are referred to collectively as ________. A) grayware B) alertware C) viruses D) firmware
answer
a
question
Which of the following statements about cookies is NOT true? a. Cookies help companies determine the traffic flow through their website. b. Some companies sell the personal information found in cookies to other companies. c. Cookies obtain your personal information by searching your hard drive. d. Cookies are text files.
answer
c
question
A social engineering technique in which you create a scenario to gain someone's trust is known as ___. a. spear phishing b. pretexting c. masquerading d. pharming
answer
b
question
Updating your operating software on a regular basis helps prevent system corruption from ______, which are malicious websites downloading harmful software to your computer. a. drive-by-downloads b. pharming c. phishing d. CAPTCHA
answer
a
question
A backup of all of the files on your computer, which is essentially a snapshot of how your computer looks at a particular point in time, is known as a(n) ___ backup. a. image b. incremental c. total d. global
answer
a
question
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data 1. spear phishing 2. rootkit 3. scareware 4. zombie 5. spyware
answer
1
question
programs that allow hackers to gain access to your computer without your knowledge 1. spear phishing 2. rootkit 3. scareware 4. zombie 5. spyware
answer
2
question
malware on your computer used to convince you that your computer has a virus 1. spear phishing 2. rootkit 3. scareware 4. zombie 5. spyware
answer
3
question
a computer controlled by a hacker 1. spear phishing 2. rootkit 3. scareware 4. zombie 5. spyware
answer
4
question
transmits information about you, such as your Internet-surfing habits 1. spear phishing 2. rootkit 3. scareware 4. zombie 5. spyware
answer
5
question
a computer's identity on the Internet 1. packet filtering 2. IP address 3. firewall 4. CAPTCHA 5. geotag
answer
2
question
hardware or software for protecting computers from hackers 1. packet filtering 2. IP address 3. firewall 4. CAPTCHA 5. geotag
answer
3
question
program that generates distorted text and require that it be typed into a box 1. packet filtering 2. IP address 3. firewall 4. CAPTCHA 5. geotag
answer
4
question
data attached to a photo that indicates when/where the photo was taken 1. packet filtering 2. IP address 3. firewall 4. CAPTCHA 5. geotag
answer
5
question
method for selectively allowing certain requests to access ports 1. packet filtering 2. IP address 3. firewall 4. CAPTCHA 5. geotag
answer
1
question
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus 5. logic bomb
answer
2
question
virus that is triggered when a file is opened or when a program is started a certain number of times 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus 5. logic bomb
answer
5
question
attempts to travel between systems through network connections to spread an infection 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus 5. logic bomb
answer
1
question
virus that changes its own code to avoid detection 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus 5. logic bomb
answer
4
question
a program that renders your computer files unusable by compressing them 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus 5. logic bomb
answer
3
question
All of the following activities may infect your computer with a virus EXCEPT ________. A) printing a document B) sharing flash drives C) downloading video files from peer-to-peer sites D) downloading or running an e-mail attachment file
answer
a
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) White-hat B) Gray-hat C) Black-hat D) Green-hat
answer
a
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. a. rootkit b. zombie c. logic bomb d. denial of service (DoS)
answer
a
question
*answer could be wrong* All of the following are ways that you might lose the files stored on your computer, EXCEPT ___. a. unauthorized access b. tampering c. pretexting d. accidental destruction e. all of these are ways that you could lose the files on your computer
answer
c
question
Which of the following is NOT a major type of cybercrime reported to the IC3? a. Advance fee fraud b. Malware fraud c. Identity theft d. FBI-related scams
answer
b
question
A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer. a. botnet b. sniffer c. rootkit d. zombie
answer
d
question
From the list below, identify the biometric authentication device(s)? A. Captcha B. Face pattern recognition C. Voice authentication D. Passphrase a. B only b. B and D only c. B and C only d. A, B, and C only
answer
c
question
Which of the following is NOT A TRUE statement? a. Mobile devices can be protected from theft by installing software that will set off an alarm if the computer is moved. b. Placing your desktop computer under the desk, with the fan intake vents again the wall, is a bad location choice. c. Since computers generate a lot of heat anyway, you can expect that no damage will come to a laptop that is left in your car all day during August in Florida. d. Surge protectors should be replaced every two to three years.
answer
c
question
A backup of only the files on your computing device that have been created (or changed) since the last backup is known as a(n) _____. a. incremental backup b. total backup c. global backup d. image backup
answer
a
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. a. theft b. pharming c. pretexting d. engineering
answer
d