Final Chap 9

The terms virus and worm actually mean the same thing.

false

An encryption virus replicates itself onto a hard drive's master boot record.

false

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

true

Ethical hackers are also known as white-hat hackers.

true

You should use the same password for each system or website you need to access.

false

Creating and spreading online viruses is a cybercrime.

true

All viruses cause serious destruction of computer data.

false

A virus signature is a portion of virus code that is unique to a particular computer virus.

true

Currently, there are no antivirus programs for mobile devices.

false

A zombie is another person's computer controlled by a hacker.

true

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

a personal firewall

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

Rules for creating passwords include all of the following EXCEPT ________.

use a dictionary to find a lengthy word that is easy to remember

FBI-related scams involve ________.

people pretending to represent official organizations such as the Dept. of Homeland Security

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

________ viruses are often transmitted by a flash drive left in a USB port.

Boot-sector

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

CAPTCHA stands for ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

Which type of virus was the famous Michelangelo virus?

A time bomb

Final Chap 9 - Subjecto.com

Final Chap 9

Your page rank:

Total word count: 388
Pages: 1

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

The terms virus and worm actually mean the same thing.

false

An encryption virus replicates itself onto a hard drive’s master boot record.

false

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

true

Ethical hackers are also known as white-hat hackers.

true

You should use the same password for each system or website you need to access.

false

Creating and spreading online viruses is a cybercrime.

true

All viruses cause serious destruction of computer data.

false

A virus signature is a portion of virus code that is unique to a particular computer virus.

true

Currently, there are no antivirus programs for mobile devices.

false

A zombie is another person’s computer controlled by a hacker.

true

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

a personal firewall

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

Rules for creating passwords include all of the following EXCEPT ________.

use a dictionary to find a lengthy word that is easy to remember

FBI-related scams involve ________.

people pretending to represent official organizations such as the Dept. of Homeland Security

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

________ viruses are often transmitted by a flash drive left in a USB port.

Boot-sector

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

CAPTCHA stands for ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

Which type of virus was the famous Michelangelo virus?

A time bomb

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending