CIS105 Ch 9

25 July 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. a. a packet sniffer b. a firewall c. a packet filter d. antivirus software
answer
b. a firewall
question
IC3 is a partnership between the ________. a. FBI and local police departments b. FBI and National Defense Department c. FBI and National White Collar Crime Center d. National White Collar Crime Center and National Defense Department
answer
c. FBI and National White Collar Crime Center
question
The protocol using port 53 is ________. a. FTP control b. STMP c. DNS d. HTTP
answer
c. DNS
question
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. true or false
answer
true
question
The only way your identity can be stolen is by a computer. true or false
answer
false
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. a. Black-hat b. Gray-hat c. White-hat d. Green-hat
answer
c. White-hat
question
CAPTCHA stands for ________. a. Completely Amazing Public Turing Test to Tell Computers and Humans Apart b. Completely Automated Private Turing Trial to Tell Computers and Humans Apart c. Completely Automated Public Turing Test to Tell Computers and Humans Apart d. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.
answer
c. Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. a. Spyware Mobile Banking b. Spyeye Mobile Banking c. Spyware Online Banking d. Spyeye Online Banking
answer
b. Spyeye Mobile Banking
question
Which of the following classifications of viruses can change its own code to avoid detection? a. Stealth b. Multipartite c. Polymorphic d. Worm
answer
c. Polymorphic
question
Creating and disseminating ________ is one of the most widespread types of cybercrimes. a. spam b. computer viruses c. fake credit cards d. FBI-related scams
answer
b. computer viruses
question
A virus signature is a portion of virus code that is unique to a particular computer virus. true or false
answer
true
question
All of the following are the main functions of antivirus software, EXCEPT ________. a. looking for virus signatures b. quarantining viruses c. inoculating key files d. assassinating all viruses
answer
d. assassinating all viruses
question
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. a. use your debit card information to purchase items illegally b. assume your identity c. steal your logon and passwords for various accounts d. launch a denial of service (DoS) attack on your computer
answer
d. launch a denial of service (DoS) attack on your computer
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. a. engineering b. theft c. pretexting d. pharming
answer
a. engineering
question
All viruses cause serious destruction of computer data. true or false
answer
false
question
Adware and spyware are referred to collectively as ________. a. viruses b. grayware c. alertware d. firmware
answer
b. grayware
question
Theft of a tablet is considered cybercrime. true or false
answer
false
question
All of the following are considered cybercrimes, EXCEPT ________. a. identity theft b. non-delivery of merchandise c. theft of a cell phone d. hacking
answer
c. theft of a cell phone
question
A ________ is a virus that is attached to documents such as Word or Excel files. a. script virus b. macro virus c. polymorphic virus d. worm
answer
b. macro virus
question
Ethical hackers are also known as white-hat hackers. true or false
answer
true
question
Creating and spreading online viruses is a cybercrime. true or false
answer
true
question
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.
answer
Spyeye Mobile Banking
question
Hackers most often obtain access to someone's computer via direct access. true or false
answer
false
question
A time bomb is a virus that is triggered when certain conditions are met such as opening a file. true or false
answer
false
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? a. Social networking b. Cybercrime c. Phishing d. Hacking
answer
b. Cybercrime
question
To create a secure password, you should use both uppercase and lowercase letters. true or false
answer
true
question
Which type of virus was the famous Michelangelo virus? a. A worm b. A time bomb c. A script virus d. An e-mail virus
answer
b. A time bomb
question
A worm infects a host file and waits for that file to be executed on another computer to replicate. true or false
answer
false
question
CAPTCHA stands for ________. 1. Completely Amazing Public Turing Test to Tell Computers and Humans Apart 2. Completely Automated Private Turing Trial to Tell Computers and Humans Apart 3. Completely Automated Public Turing Test to Tell Computers and Humans Apart 4. Complete Automated Public Turing Trial to Tell Computers and Humans Apart.
answer
3. Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
A virus signature is a portion of virus code that is unique to a particular computer virus. false or true
answer
true
question
All viruses cause serious destruction of computer data. false or true
answer
false
question
The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. true or false
answer
false
question
Theft of a tablet is considered cybercrime. false or true
answer
false
question
In 1999, the Melissa virus became the first major macro virus to cause problems worldwide. true or false
answer
true
question
________ viruses are often transmitted by a flash drive left in a USB port. a. Logic bomb b. Boot-sector c. Macro d. Encryption
answer
b. Boot-sector
question
All of the following are considered cybercrimes, EXCEPT ________. 1. identity theft 2. non-delivery of merchandise 3. theft of a cell phone 4. hacking
answer
3. theft of a cell phone
question
A ________ is a virus that is attached to documents such as Word or Excel files. 1. script virus 2. macro virus 3. polymorphic virus 4. worm
answer
2. macro virus
question
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. 1. a packet sniffer 2. a firewall 3. a packet filter 4. antivirus software
answer
2. a firewall
question
All of the following are the main functions of antivirus software, EXCEPT ________. 1. looking for virus signatures 2. quarantining viruses 3. inoculating key files 4. assassinating all viruses
answer
4. assassinating all viruses
question
Which of the following classifications of viruses can change its own code to avoid detection? 1. Stealth 2. Multipartite 3. Polymorphic 4. Worm
answer
3. Polymorphic