Regarding computer protection, quarantining is defined as:
answer
placing a found virus in a secure area on the hard drive
question
Which type of virus was the famous Michelangelo virus?
answer
time bomb
question
Creating and distributing ________ is one of the most widespread types of cyber crimes
answer
computer viruses
question
Which is not one of the four key pieces of personal information you should protect from identity thieves?
answer
anniversary
question
The Internet Crime Complaint Center (IC3) is a partnership between the:
answer
FBI and National White Collar Crime Center
question
A packet analyzer is a program that can enable a hacker to do all of the following except:
answer
assume your identity
use your debit card information to purchase items illegally
launch a denial of service (DoS) attack on your computer
steal your logons and passwords for various accounts
launch a denial of service (DoS) attack on your computer
question
Viruses, adware, and spyware are referred to collectively as:
answer
grayware
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
polymorphic
question
A________ takes advantage of file transport methods, such as e-mail, to spread on its own
answer
worm
question
Using your computer for non-work activities while you are being paid to work is known as:
answer
cyberloafing
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information
answer
DDoS attack
question
An__________ backup makes a copy of all changes since the last backup
answer
incremental
question
Which of the following statements about cookies is not true?
answer
cookies obtain your personal information by searching your hard drive.
cookies help companies determine the traffic flow through their website.
cookies are text files.
some companies sell the personal information found in cookies to other companies.
cookies obtain your personal information by searching your hard drive
question
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
answer
white-hat
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing:
answer
a firewall
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
cybercrime
question
All of the following activities may infect your computer with a virus except:
answer
printing a document
downloading or running an e-mail attachment file
downloading video files from peer-to-peer sites
sharing flash drives
printing a document
question
________ is a program that gathers information about your surfing habits without your knowledge
answer
spyware
question
A ________ is a virus that is triggered on a certain date
answer
time bomb
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy