The terms virus and worm actually mean the same thing. |
false |
An encryption virus replicates itself onto a hard drive's master boot record. |
false |
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols. |
true |
Ethical hackers are also known as white-hat hackers. |
true |
You should use the same password for each system or website you need to access. |
false |
Creating and spreading online viruses is a cybercrime. |
true |
All viruses cause serious destruction of computer data. |
false |
A virus signature is a portion of virus code that is unique to a particular computer virus. |
true |
Currently, there are no antivirus programs for mobile devices. |
false |
A zombie is another person's computer controlled by a hacker. |
true |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? |
Cybercrime |
With regard to computer protection, quarantining is defined as ________. |
placing a found virus in a secure area on the hard drive |
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. |
a personal firewall |
________ is a program that gathers information about your surfing habits without your knowledge. |
Spyware |
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. |
rootkit |
Rules for creating passwords include all of the following EXCEPT ________. |
use a dictionary to find a lengthy word that is easy to remember |
FBI-related scams involve ________. |
people pretending to represent official organizations such as the Dept. of Homeland Security |
Creating and distributing ________ is one of the most widespread types of cybercrimes. |
computer viruses |
________ viruses are often transmitted by a flash drive left in a USB port. |
Boot-sector |
A ________ is a virus that is attached to documents such as Word or Excel files. |
macro virus |
Which of the following classifications of viruses can change its own code to avoid detection? |
Polymorphic |
Which of the following statements about cookies is NOT true? |
Cookies obtain your personal information by searching your hard drive. |
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
A DDoS attack |
CAPTCHA stands for ________. |
Completely Automated Public Turing Test to Tell Computers and Humans Apart |
Which type of virus was the famous Michelangelo virus? |
A time bomb |