Chapter 9 example #29203

15 November 2022
4.9 (140 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
All of the following are top cyber crimes reported to the IC3 EXCEPT ________
answer
identity theft advanced fee fraud malware fraud non-auction scam malware fraud
question
Regarding computer protection, quarantining is defined as:
answer
placing a found virus in a secure area on the hard drive
question
Which type of virus was the famous Michelangelo virus?
answer
time bomb
question
Creating and distributing ________ is one of the most widespread types of cyber crimes
answer
computer viruses
question
Which is not one of the four key pieces of personal information you should protect from identity thieves?
answer
anniversary
question
The Internet Crime Complaint Center (IC3) is a partnership between the:
answer
FBI and National White Collar Crime Center
question
A packet analyzer is a program that can enable a hacker to do all of the following except:
answer
assume your identity use your debit card information to purchase items illegally launch a denial of service (DoS) attack on your computer steal your logons and passwords for various accounts launch a denial of service (DoS) attack on your computer
question
Viruses, adware, and spyware are referred to collectively as:
answer
grayware
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
polymorphic
question
A________ takes advantage of file transport methods, such as e-mail, to spread on its own
answer
worm
question
Using your computer for non-work activities while you are being paid to work is known as:
answer
cyberloafing
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information
answer
DDoS attack
question
An__________ backup makes a copy of all changes since the last backup
answer
incremental
question
Which of the following statements about cookies is not true?
answer
cookies obtain your personal information by searching your hard drive. cookies help companies determine the traffic flow through their website. cookies are text files. some companies sell the personal information found in cookies to other companies. cookies obtain your personal information by searching your hard drive
question
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
answer
white-hat
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing:
answer
a firewall
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
cybercrime
question
All of the following activities may infect your computer with a virus except:
answer
printing a document downloading or running an e-mail attachment file downloading video files from peer-to-peer sites sharing flash drives printing a document
question
________ is a program that gathers information about your surfing habits without your knowledge
answer
spyware
question
A ________ is a virus that is triggered on a certain date
answer
time bomb