True |
A worm does not require human interaction to spread to other computers |
False |
All viruses cause serious destruction of computer data |
False |
A stealth virus is designed to infect multiple types to fool the antivirus software |
False |
An encryption virus replicates itself into a hard drives master boot record |
True |
A macro virus is a virus that is attached to a file such as a word document or excel workbook |
True |
Ethical hackers are also known as white-hat hackers |
False |
A denial-of-service attack can be used to deny hackers access to a computer system |
False |
The terms virus and work actually mean the same thing |
True |
Creating and spreading online viruses is a cybercrime |
True |
A zombie is another persons computer controlled by a hacker |
True |
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols |
True |
A time bomb virus can be triggered on a certain date |
False |
You should use the same password for each system or website you need to access |
True |
A virus signature is a portion of virus code that is unique to a particular computer virus |
False |
Currently, there are no antivirus programs for mobile devices |
Chapter 9 True-False
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price