Chapter 9 Tia

25 July 2022
4.7 (114 reviews)
46 test answers

Unlock all answers in this set

Unlock answers (42)
question
All of the following are top cybercrimes reported to the IC3 EXCEPT BLANK
answer
malware fraud
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
The Internet Crime Complaint Center (IC3) is a partnership between the BLANK
answer
FBI and National White Collar Crime Center
question
Government impersonation scams involve BLANK
answer
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
question
Creating and distributing BLANK is one of the most widespread types of cybercrimes.
answer
computer viruses
question
Which of the following is NOT a virus category?
answer
Pharming
question
All of the following activities may infect your computer with a virus EXCEPT BLANK
answer
printing a document
question
Which is NOT one of the four key pieces of personal information you should protect from identity thieves?
answer
Anniversary
question
Which type of virus was the famous Michelangelo virus?
answer
A time bomb
question
A BLANK is a virus that is triggered on a certain date.
answer
time bomb
question
A(n) BLANK takes advantage of file transport methods, such as e-mail, to spread on its own.
answer
worm
question
A BLANK is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
Regarding computer protection, quarantining is defined as BLANK.
answer
placing a found virus in a secure area on the hard drive
question
A(n) BLANK is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
BLANK hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT BLANK.
answer
launch a denial of service (DoS) attack on your computer
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
answer
rootkit
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing BLANK.
answer
a firewall
question
BLANK floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
In computing, a BLANK is named after a housing construction feature that slows the spread of fires from house to house.
answer
firewall
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as BLANK.
answer
logical port blocking
question
Rules for creating passwords include all of the following EXCEPT BLANK.
answer
keep a master password that is the same for all of your accounts
question
CAPTCHA is ________.
answer
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
question
Viruses, adware, and spyware are referred to collectively as BLANK.
answer
grayware
question
BLANK is a program that gathers information about your surfing habits without your knowledge.
answer
Spyware
question
Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive.
question
Social BLANK is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as BLANK.
answer
pharming
question
Using your computer for non-work activities while you are being paid to work is known as BLANK.
answer
cyberloafing
question
Creating and spreading online viruses is a cybercrime
answer
true
question
A time bomb virus can be triggered on a certain date.
answer
true
question
All viruses cause serious destruction of computer data.
answer
false
question
The terms virus and worm mean the same thing.
answer
false
question
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook
answer
true
question
A virus signature is a portion of virus code that is unique to a particular computer virus.
answer
fasle
question
Currently, there are no antivirus programs for mobile devices.
answer
false
question
An encryption virus replicates itself onto a hard drive's master boot record.
answer
false
question
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
answer
false
question
A worm does NOT require human interaction to spread to other computers.
answer
true
question
Since you can always redownload program files, you do not need to include them in backups.
answer
false
question
A denial-of-service attack can be used to deny hackers access to a computer system.
answer
false
question
A stealth virus is designed to infect multiple file types to fool the antivirus software.
answer
false
question
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
answer
true
question
Ethical hackers are also known as white-hat hackers.
answer
true
question
You should use the same password for each system or website you need to access.
answer
false