Chapter 9- Computer Concepts

Your page rank:

Total word count: 717
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.

theft of services

A ________ is a virus that is triggered on a certain date.

time bomb

A(n) ________ takes advantage of file transport methods to spread on its own.

worm

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure are on the hard drive

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

White-hat

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.

launch a denial of service (DoS) attack on your computer

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

a firewall

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

firewall

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

Rules for creating passwords include all of the following EXCEPT ________.

use a dictionary to find a lengthy word that is easy to remember

CAPTCHA stands for ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

Adware and spyware are referred to collectively as ________.

grayware

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.

pharming

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

FBI and National White Collar Crime Center

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

FBI-related scams involve ________.

people pretending to represent official organizations

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

Creating and spreading online viruses is a cybercrime.

True

A time bomb virus can be triggered on a certain date.

True

All viruses cause serious destruction of computer data.

False

The terms virus and worm actually mean the same thing.

False

Which of the following is NOT a virus category?

pharming

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

True

A virus signature is a portion of virus code that is unique to a particular computer virus.

True

Currently, there are no antivirus programs for mobile devices.

False

An encryption virus replicates itself onto a hard drive’s master boot record.

False

A worm does NOT require human interaction to spread to other computers.

True

A zombie is another person’s computer controlled by a hacker.

True

A denial-of-service attack can be used to deny hackers access to a computer system.

False

A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

True

Ethical hackers are also known as white-hat hackers.

True

All of the following are ways that can infect your computer with a virus EXCEPT ________.

installing a manufacturer’s printer driver

You should use the same password for each system or website you need to access.

False

________ viruses are often transmitted by a flash drive left in a USB port.

Boot-sector

Which type of virus was the famous Michelangelo virus?

A time bomb

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending