Chapter 9 tia

Your page rank:

Total word count: 783
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

All of the following are top cybercrimes reported to the IC3 EXCEPT BLANK

malware fraud

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

The Internet Crime Complaint Center (IC3) is a partnership between the BLANK

FBI and National White Collar Crime Center

Government impersonation scams involve BLANK

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

Creating and distributing BLANK is one of the most widespread types of cybercrimes.

computer viruses

Which of the following is NOT a virus category?

Pharming

All of the following activities may infect your computer with a virus EXCEPT BLANK

printing a document

Which is NOT one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

Which type of virus was the famous Michelangelo virus?

A time bomb

A BLANK is a virus that is triggered on a certain date.

time bomb

A(n) BLANK takes advantage of file transport methods, such as e-mail, to spread on its own.

worm

A BLANK is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

Regarding computer protection, quarantining is defined as BLANK.

placing a found virus in a secure area on the hard drive

A(n) BLANK is the portion of virus code that is unique to a particular computer virus.

virus signature

BLANK hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

White-hat

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT BLANK.

launch a denial of service (DoS) attack on your computer

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing BLANK.

a firewall

BLANK floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

In computing, a BLANK is named after a housing construction feature that slows the spread of fires from house to house.

firewall

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as BLANK.

logical port blocking

Rules for creating passwords include all of the following EXCEPT BLANK.

keep a master password that is the same for all of your accounts

CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

Viruses, adware, and spyware are referred to collectively as BLANK.

grayware

BLANK is a program that gathers information about your surfing habits without your knowledge.

Spyware

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Social BLANK is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as BLANK.

pharming

Using your computer for non-work activities while you are being paid to work is known as BLANK.

cyberloafing

Creating and spreading online viruses is a cybercrime

true

A time bomb virus can be triggered on a certain date.

true

All viruses cause serious destruction of computer data.

false

The terms virus and worm mean the same thing.

false

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook

true

A virus signature is a portion of virus code that is unique to a particular computer virus.

fasle

Currently, there are no antivirus programs for mobile devices.

false

An encryption virus replicates itself onto a hard drive’s master boot record.

false

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

false

A worm does NOT require human interaction to spread to other computers.

true

Since you can always redownload program files, you do not need to include them in backups.

false

A denial-of-service attack can be used to deny hackers access to a computer system.

false

A stealth virus is designed to infect multiple file types to fool the antivirus software.

false

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

true

Ethical hackers are also known as white-hat hackers.

true

You should use the same password for each system or website you need to access.

false

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending