TIA Chapter 9 Exam

All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________.
A. Identity Theft
B. non-auction/non-delivery of merchandise
C. advance fee fraud
D. child pornography

D. child pornography

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A. social networking
B. cybercrime
c. phishing
d. hacking

B. cybercrime

IC3 is a partnership between the _________.
A. FBI and local police departments
B. FBI and National Defense Department
C. FBI and National White Collar Crime Center
D. National White Collar Crime Center and National Defense Department

C. FBI and National White Collar Crime Center

Which type of virus was the famous Michelangelo virus?
A. A worm
B. A time bomb
C. A script virus
D. An e-mail virus

B. A time bomb

FBI-related scams involve ________.
A. people pretending to represent official organizations
B. running auctions that do not exist
C. convincing people to send money as a "good faith" gesture
D. collecting funds and not delivering the goods

A. people pretending to represent official organizations

A _____________ is a virus that is attached to documents such as a word or excel files.
A. script virus
B. Macro virus
C. Polymorphic Virus
D. Worm

B. Macro virus

Which of the following classification of viruses can change its own code to avoid detection?
A. Stealth
B. Multipartite
C. Polymorphic
D. Worm

C. Polymorphic

Creating and disseminating ______ is one of the most widespread types of crimes.
A. Spam
B. Computer viruses
C. fake credit cards
D. FBI related scams

B. Computer viruses

With regard to computer protection, quarantining is defined as ________.
A. updating your antivirus software
B. placing a found virus in a secure area in the hardware
C. repairing an infected file
d. deleting an infected file

B. placing a found virus in a secure area in the hardware

All of the following are considered cybercrimes, EXCEPT ____.
A. identity theft
B. non-delivery of merchandise
C. theft of a cell phone
D. hacking

C. theft of a cell phone

All of the following are ways that can infect your computer with a virus, EXCEPT _________.
A. sharing flash drives
B. downloading video files from peer-to-peer sites
C. downloading or running an e-mail attachment file
D. logging into e-mail

D. logging into e-mail

A(n) ___ is the portion of virus code that is unique to a particular computer virus.
A. virus signature
B. encryption code
C. compression code
D. virus pattern

A. virus signature

One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information.
A. Spyware Mobile Banking
B. Spyeye Mobile Banking
C. Spyware Online Banking
D. Spyeye Online Banking

B. Spyeye Mobile Banking

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______.
A. use your debit card information to purchase items illegally
B. assume your identity
C. steal your logon and passwords for various accounts
D. launch a denial of service (DoS) attack on your computer

D. launch a denial of service (DoS) attack on your computer

All of the following are categories of viruses, EXCEPT ________.
A. snakes
B. boot sector
C. email
D. encryption

A. snakes

You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____.
A. a packet sniffer
B. a firewall
C. a packet filter
D. antivirus software

B. a firewall

________ viruses are often transmitted by a flash drive left in a USB port.
A. logic bomb
B. boot-sector
C. macro
D. encryption

B. boot-sector

A _____ is a virus that is triggered on a certain date.
A. worm
B. script
C. logic bomb
D. time bomb

D. time bomb

_________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A. A Trojan horse
B. A polymorphic virus
C. A DDoS attack
D. Port blocking

C. A DDoS attack

A(n) ______ takes advantage of file transport methods to spread on their own.
A. worm
B. script
C. encryption
D. time bomb

A. worm

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________.
A. packet filtering
B. packet switching
C. static addressing
D. logical port blocking

D. logical port blocking

A ___ virus changes its own code or periodically rewrites itself to avoid detection.
A) multipartite
B) stealth
C) polymorphic
D) polypertite

C. polymorphic

Rules for creating passwords include all of the following, EXCEPT ____.
A. Keep your password a secret
B. Change your password frequently
C. Keep your password written down and stored in any easy-to-remember location
D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols

C. Keep your password written down and stored in any easy-to-remember location

CAPTCHA stands for _______.
A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart

C. Completely Automated Public Turing Test to Tell Computers and Humans Apart

Adware and spyware are referred to collectively as __________.
A. viruses
B. grayware
C. altertware
D. firmware

B. grayware

All of the following are the main functions of antivirus software, EXCEPT _______.
A. Looking for virus signatures
B. quarantining viruses
C. inoculating key files
D. assassinating all viruses

D. assassinating all viruses

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
A. Adware
B. Malware
C. Shareware
D. Spyware

D. Spyware

___ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities
A) Blakc-hat
B) Gray-hat
C) White-hat
D) Green-hat

C) White-hat

Which of the following statements about cookies is NOT true?
A. Cookies obtain your personal information by searching your hard drive.
B. Cookies are text files.
C. Cookies help companies determine the traffic flow through their Web site.
D. Some companies sell the personal information found in cookies to other companies

A. cookies obtain your personal information by searching your hard drive

A ________ is named after a housing construction feature that slows the spread of fires from house to house.
A. firehouse
B. wallfire
C. firewall
D. fire protector

C. firewall

Social ___ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A) engineering
B) theft
C) pretexting
D) pharming

A) engineering

The protocol using port 53 is ______.
A. FTP control
B. STMP
C. DNS
D. HTTP

C. DNS

Which of these statements about physically protecting your computer is FALSE?
A. The computer should sit on a flat level surface.
B. Power surges can be blocked by using a computer surround.
C. It is best to unplug computers during an electrical storm.
D. Old surge protectors can deliver power to your computer without protecting it.

B. Power surges can be blocked by using a computer surround

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.
A. phishing
B. pharming
C. pretexting
D. phlying

B. pharming

Using your computer for non-work activities while you are being paid to do your job is known as ________.
A. cyberloafing
B. cybersleeping
C. cyberlazing
D. cyberbreaking

A. cyberloafing

TIA Chapter 9 Exam - Subjecto.com

TIA Chapter 9 Exam

Your page rank:

Total word count: 1219
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________.
A. Identity Theft
B. non-auction/non-delivery of merchandise
C. advance fee fraud
D. child pornography

D. child pornography

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A. social networking
B. cybercrime
c. phishing
d. hacking

B. cybercrime

IC3 is a partnership between the _________.
A. FBI and local police departments
B. FBI and National Defense Department
C. FBI and National White Collar Crime Center
D. National White Collar Crime Center and National Defense Department

C. FBI and National White Collar Crime Center

Which type of virus was the famous Michelangelo virus?
A. A worm
B. A time bomb
C. A script virus
D. An e-mail virus

B. A time bomb

FBI-related scams involve ________.
A. people pretending to represent official organizations
B. running auctions that do not exist
C. convincing people to send money as a "good faith" gesture
D. collecting funds and not delivering the goods

A. people pretending to represent official organizations

A _____________ is a virus that is attached to documents such as a word or excel files.
A. script virus
B. Macro virus
C. Polymorphic Virus
D. Worm

B. Macro virus

Which of the following classification of viruses can change its own code to avoid detection?
A. Stealth
B. Multipartite
C. Polymorphic
D. Worm

C. Polymorphic

Creating and disseminating ______ is one of the most widespread types of crimes.
A. Spam
B. Computer viruses
C. fake credit cards
D. FBI related scams

B. Computer viruses

With regard to computer protection, quarantining is defined as ________.
A. updating your antivirus software
B. placing a found virus in a secure area in the hardware
C. repairing an infected file
d. deleting an infected file

B. placing a found virus in a secure area in the hardware

All of the following are considered cybercrimes, EXCEPT ____.
A. identity theft
B. non-delivery of merchandise
C. theft of a cell phone
D. hacking

C. theft of a cell phone

All of the following are ways that can infect your computer with a virus, EXCEPT _________.
A. sharing flash drives
B. downloading video files from peer-to-peer sites
C. downloading or running an e-mail attachment file
D. logging into e-mail

D. logging into e-mail

A(n) ___ is the portion of virus code that is unique to a particular computer virus.
A. virus signature
B. encryption code
C. compression code
D. virus pattern

A. virus signature

One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information.
A. Spyware Mobile Banking
B. Spyeye Mobile Banking
C. Spyware Online Banking
D. Spyeye Online Banking

B. Spyeye Mobile Banking

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______.
A. use your debit card information to purchase items illegally
B. assume your identity
C. steal your logon and passwords for various accounts
D. launch a denial of service (DoS) attack on your computer

D. launch a denial of service (DoS) attack on your computer

All of the following are categories of viruses, EXCEPT ________.
A. snakes
B. boot sector
C. email
D. encryption

A. snakes

You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____.
A. a packet sniffer
B. a firewall
C. a packet filter
D. antivirus software

B. a firewall

________ viruses are often transmitted by a flash drive left in a USB port.
A. logic bomb
B. boot-sector
C. macro
D. encryption

B. boot-sector

A _____ is a virus that is triggered on a certain date.
A. worm
B. script
C. logic bomb
D. time bomb

D. time bomb

_________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A. A Trojan horse
B. A polymorphic virus
C. A DDoS attack
D. Port blocking

C. A DDoS attack

A(n) ______ takes advantage of file transport methods to spread on their own.
A. worm
B. script
C. encryption
D. time bomb

A. worm

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________.
A. packet filtering
B. packet switching
C. static addressing
D. logical port blocking

D. logical port blocking

A ___ virus changes its own code or periodically rewrites itself to avoid detection.
A) multipartite
B) stealth
C) polymorphic
D) polypertite

C. polymorphic

Rules for creating passwords include all of the following, EXCEPT ____.
A. Keep your password a secret
B. Change your password frequently
C. Keep your password written down and stored in any easy-to-remember location
D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols

C. Keep your password written down and stored in any easy-to-remember location

CAPTCHA stands for _______.
A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart

C. Completely Automated Public Turing Test to Tell Computers and Humans Apart

Adware and spyware are referred to collectively as __________.
A. viruses
B. grayware
C. altertware
D. firmware

B. grayware

All of the following are the main functions of antivirus software, EXCEPT _______.
A. Looking for virus signatures
B. quarantining viruses
C. inoculating key files
D. assassinating all viruses

D. assassinating all viruses

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
A. Adware
B. Malware
C. Shareware
D. Spyware

D. Spyware

___ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities
A) Blakc-hat
B) Gray-hat
C) White-hat
D) Green-hat

C) White-hat

Which of the following statements about cookies is NOT true?
A. Cookies obtain your personal information by searching your hard drive.
B. Cookies are text files.
C. Cookies help companies determine the traffic flow through their Web site.
D. Some companies sell the personal information found in cookies to other companies

A. cookies obtain your personal information by searching your hard drive

A ________ is named after a housing construction feature that slows the spread of fires from house to house.
A. firehouse
B. wallfire
C. firewall
D. fire protector

C. firewall

Social ___ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A) engineering
B) theft
C) pretexting
D) pharming

A) engineering

The protocol using port 53 is ______.
A. FTP control
B. STMP
C. DNS
D. HTTP

C. DNS

Which of these statements about physically protecting your computer is FALSE?
A. The computer should sit on a flat level surface.
B. Power surges can be blocked by using a computer surround.
C. It is best to unplug computers during an electrical storm.
D. Old surge protectors can deliver power to your computer without protecting it.

B. Power surges can be blocked by using a computer surround

When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________.
A. phishing
B. pharming
C. pretexting
D. phlying

B. pharming

Using your computer for non-work activities while you are being paid to do your job is known as ________.
A. cyberloafing
B. cybersleeping
C. cyberlazing
D. cyberbreaking

A. cyberloafing

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending