All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. |
theft of services |
A ________ is a virus that is triggered on a certain date. |
time bomb |
A(n) ________ takes advantage of file transport methods to spread on its own. |
worm |
A ________ is a virus that is attached to documents such as Word or Excel files. |
macro virus |
Which of the following classifications of viruses can change its own code to avoid detection? |
Polymorphic |
With regard to computer protection, quarantining is defined as ________. |
placing a found virus in a secure are on the hard drive |
A(n) ________ is the portion of virus code that is unique to a particular computer virus. |
virus signature |
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. |
White-hat |
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________. |
launch a denial of service (DoS) attack on your computer |
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. |
rootkit |
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. |
a firewall |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? |
Cybercrime |
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
A DDoS attack |
A ________ is named after a housing construction feature that slows the spread of fires from house to house. |
firewall |
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. |
logical port blocking |
Rules for creating passwords include all of the following EXCEPT ________. |
use a dictionary to find a lengthy word that is easy to remember |
CAPTCHA stands for ________. |
Completely Automated Public Turing Test to Tell Computers and Humans Apart |
Adware and spyware are referred to collectively as ________. |
grayware |
________ is a program that gathers information about your surfing habits without your knowledge. |
Spyware |
Which of the following statements about cookies is NOT true? |
Cookies obtain your personal information by searching your hard drive. |
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
engineering |
When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________. |
pharming |
The Internet Crime Complaint Center (IC3) is a partnership between the ________. |
FBI and National White Collar Crime Center |
Using your computer for non-work activities while you are being paid to work is known as ________. |
cyberloafing |
FBI-related scams involve ________. |
people pretending to represent official organizations |
Creating and distributing ________ is one of the most widespread types of cybercrimes. |
computer viruses |
Creating and spreading online viruses is a cybercrime. |
True |
A time bomb virus can be triggered on a certain date. |
True |
All viruses cause serious destruction of computer data. |
False |
The terms virus and worm actually mean the same thing. |
False |
Which of the following is NOT a virus category? |
pharming |
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. |
True |
A virus signature is a portion of virus code that is unique to a particular computer virus. |
True |
Currently, there are no antivirus programs for mobile devices. |
False |
An encryption virus replicates itself onto a hard drive’s master boot record. |
False |
A worm does NOT require human interaction to spread to other computers. |
True |
A zombie is another person’s computer controlled by a hacker. |
True |
A denial-of-service attack can be used to deny hackers access to a computer system. |
False |
A stealth virus is designed to infect multiple file types to fool the antivirus software. |
False |
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols. |
True |
Ethical hackers are also known as white-hat hackers. |
True |
All of the following are ways that can infect your computer with a virus EXCEPT ________. |
installing a manufacturer’s printer driver |
You should use the same password for each system or website you need to access. |
False |
________ viruses are often transmitted by a flash drive left in a USB port. |
Boot-sector |
Which type of virus was the famous Michelangelo virus? |
A time bomb |
Chapter 9- Computer Concepts
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price