Chapter 9 Practice Multiple Choice

White-hat

_____ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

Cyberloafing

Using your computer for non-work activities while you are being paid to work is known as ______.

Time bomb

A ______ is a virus that is triggered on a certain date.

A firewall

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ______.

FBI and National White Collar Crime Center

The Internet Crime Complaint Center (IC3) is a partnership between the _______.

Boot-sector

_______ viruses are often transmitted by a flash drive left in a USB port.

Launch a denial of service (DoS) attack on your computer

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT _______.

Theft of services

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ______.

Computer viruses

Creating and distributing ____ is one of the most widespread types of cyber crimes.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAPTCHA stands for ______.

Firewall

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

Use a dictionary to find a lengthy word that is easy to remember

Rules for creating passwords include all of the following EXCEPT ______.

Spyware

_______ is a program that gathers information about your surfing habits without your knowledge.

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection?

Cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Worm

A ______ takes advantage of file transport methods to spread on its own.

Pharming

Which of the following is NOT a virus category?

Pharming

When malicious code is planted on your computer and alters your browsers ability to find web addresses, it is known as _______.

Rootkit

A _______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

Placing a found virus in a secure area on the hard drive

With regard to computer protection, quarantining is defined as _________.

Cookies obtain your personal information by searching your hard drive

Which of the following statements about cookies is NOT true?

Engineering

Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

Installing a manufacturers printer driver

All of the following are ways that can infect your computer with a virus EXCEPT _______.

A DDoS attack

_______ floods a computer with requests until it shuts down and refuses to answer any requests for information.

Virus signature

A ________ is the portion of virus code that is unique to a particular computer virus.

A time bomb

Which type of virus was the famous Michelangelo virus?

People pretending to represent official organizations

FBI-related scams involve ______.

Macro virus

A _______ is a virus that is attached to documents such as word or excel files.

Logical port blocking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as _____.

Grayware

Adware and spyware are referred to collectively as _______.

Chapter 9 Practice Multiple Choice - Subjecto.com

Chapter 9 Practice Multiple Choice

Your page rank:

Total word count: 515
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

White-hat

_____ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

Cyberloafing

Using your computer for non-work activities while you are being paid to work is known as ______.

Time bomb

A ______ is a virus that is triggered on a certain date.

A firewall

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ______.

FBI and National White Collar Crime Center

The Internet Crime Complaint Center (IC3) is a partnership between the _______.

Boot-sector

_______ viruses are often transmitted by a flash drive left in a USB port.

Launch a denial of service (DoS) attack on your computer

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT _______.

Theft of services

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ______.

Computer viruses

Creating and distributing ____ is one of the most widespread types of cyber crimes.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAPTCHA stands for ______.

Firewall

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

Use a dictionary to find a lengthy word that is easy to remember

Rules for creating passwords include all of the following EXCEPT ______.

Spyware

_______ is a program that gathers information about your surfing habits without your knowledge.

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection?

Cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Worm

A ______ takes advantage of file transport methods to spread on its own.

Pharming

Which of the following is NOT a virus category?

Pharming

When malicious code is planted on your computer and alters your browsers ability to find web addresses, it is known as _______.

Rootkit

A _______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

Placing a found virus in a secure area on the hard drive

With regard to computer protection, quarantining is defined as _________.

Cookies obtain your personal information by searching your hard drive

Which of the following statements about cookies is NOT true?

Engineering

Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

Installing a manufacturers printer driver

All of the following are ways that can infect your computer with a virus EXCEPT _______.

A DDoS attack

_______ floods a computer with requests until it shuts down and refuses to answer any requests for information.

Virus signature

A ________ is the portion of virus code that is unique to a particular computer virus.

A time bomb

Which type of virus was the famous Michelangelo virus?

People pretending to represent official organizations

FBI-related scams involve ______.

Macro virus

A _______ is a virus that is attached to documents such as word or excel files.

Logical port blocking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as _____.

Grayware

Adware and spyware are referred to collectively as _______.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending