Chapter 9 tia

Your page rank:

Total word count: 783
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

All of the following are top cybercrimes reported to the IC3 EXCEPT BLANK

malware fraud

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?


The Internet Crime Complaint Center (IC3) is a partnership between the BLANK

FBI and National White Collar Crime Center

Government impersonation scams involve BLANK

people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

Creating and distributing BLANK is one of the most widespread types of cybercrimes.

computer viruses

Which of the following is NOT a virus category?


All of the following activities may infect your computer with a virus EXCEPT BLANK

printing a document

Which is NOT one of the four key pieces of personal information you should protect from identity thieves?


Which type of virus was the famous Michelangelo virus?

A time bomb

A BLANK is a virus that is triggered on a certain date.

time bomb

A(n) BLANK takes advantage of file transport methods, such as e-mail, to spread on its own.


A BLANK is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the following classifications of viruses can change its own code to avoid detection?


Regarding computer protection, quarantining is defined as BLANK.

placing a found virus in a secure area on the hard drive

A(n) BLANK is the portion of virus code that is unique to a particular computer virus.

virus signature

BLANK hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.


A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT BLANK.

launch a denial of service (DoS) attack on your computer

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.


You can block logical ports from invaders and make your computer invisible to others on the Internet by installing BLANK.

a firewall

BLANK floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

In computing, a BLANK is named after a housing construction feature that slows the spread of fires from house to house.


Configuring a firewall to ignore all incoming packets that request access to a specific port is known as BLANK.

logical port blocking

Rules for creating passwords include all of the following EXCEPT BLANK.

keep a master password that is the same for all of your accounts

CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

Viruses, adware, and spyware are referred to collectively as BLANK.


BLANK is a program that gathers information about your surfing habits without your knowledge.


Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Social BLANK is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as BLANK.


Using your computer for non-work activities while you are being paid to work is known as BLANK.


Creating and spreading online viruses is a cybercrime


A time bomb virus can be triggered on a certain date.


All viruses cause serious destruction of computer data.


The terms virus and worm mean the same thing.


A macro virus is a virus that is attached to a file such as a Word document or Excel workbook


A virus signature is a portion of virus code that is unique to a particular computer virus.


Currently, there are no antivirus programs for mobile devices.


An encryption virus replicates itself onto a hard drive’s master boot record.


Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.


A worm does NOT require human interaction to spread to other computers.


Since you can always redownload program files, you do not need to include them in backups.


A denial-of-service attack can be used to deny hackers access to a computer system.


A stealth virus is designed to infect multiple file types to fool the antivirus software.


To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.


Ethical hackers are also known as white-hat hackers.


You should use the same password for each system or website you need to access.


Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message