All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. |
D. child pornography |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? |
B. cybercrime |
IC3 is a partnership between the _________. |
C. FBI and National White Collar Crime Center |
Which type of virus was the famous Michelangelo virus? |
B. A time bomb |
FBI-related scams involve ________. |
A. people pretending to represent official organizations |
A _____________ is a virus that is attached to documents such as a word or excel files. |
B. Macro virus |
Which of the following classification of viruses can change its own code to avoid detection? |
C. Polymorphic |
Creating and disseminating ______ is one of the most widespread types of crimes. |
B. Computer viruses |
With regard to computer protection, quarantining is defined as ________. |
B. placing a found virus in a secure area in the hardware |
All of the following are considered cybercrimes, EXCEPT ____. |
C. theft of a cell phone |
All of the following are ways that can infect your computer with a virus, EXCEPT _________. |
D. logging into e-mail |
A(n) ___ is the portion of virus code that is unique to a particular computer virus. |
A. virus signature |
One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. |
B. Spyeye Mobile Banking |
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. |
D. launch a denial of service (DoS) attack on your computer |
All of the following are categories of viruses, EXCEPT ________. |
A. snakes |
You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. |
B. a firewall |
________ viruses are often transmitted by a flash drive left in a USB port. |
B. boot-sector |
A _____ is a virus that is triggered on a certain date. |
D. time bomb |
_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
C. A DDoS attack |
A(n) ______ takes advantage of file transport methods to spread on their own. |
A. worm |
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. |
D. logical port blocking |
A ___ virus changes its own code or periodically rewrites itself to avoid detection. |
C. polymorphic |
Rules for creating passwords include all of the following, EXCEPT ____. |
C. Keep your password written down and stored in any easy-to-remember location |
CAPTCHA stands for _______. |
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart |
Adware and spyware are referred to collectively as __________. |
B. grayware |
All of the following are the main functions of antivirus software, EXCEPT _______. |
D. assassinating all viruses |
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. |
D. Spyware |
___ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities |
C) White-hat |
Which of the following statements about cookies is NOT true? |
A. cookies obtain your personal information by searching your hard drive |
A ________ is named after a housing construction feature that slows the spread of fires from house to house. |
C. firewall |
Social ___ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
A) engineering |
The protocol using port 53 is ______. |
C. DNS |
Which of these statements about physically protecting your computer is FALSE? |
B. Power surges can be blocked by using a computer surround |
When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________. |
B. pharming |
Using your computer for non-work activities while you are being paid to do your job is known as ________. |
A. cyberloafing |
TIA Chapter 9 Exam
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price