child pornography |
All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________. |
Cybercrime |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? |
FBI and National White Collar Crime Center |
IC3 is a partnership between the ________. |
A time bomb |
Which type of virus was the famous Michelangelo virus? |
people pretending to represent official organizations |
FBI-related scams involve ________. |
macro virus |
A ________ is a virus that is attached to documents such as Word or Excel files. |
theft of a cell phone |
All of the following are considered cybercrimes, EXCEPT ________. |
Polymorphic |
Which of the following classifications of viruses can change its own code to avoid detection? |
computer viruses |
Creating and disseminating ________ is one of the most widespread types of cybercrimes |
placing a found virus in a secure area on the hard drive |
With regard to computer protection, quarantining is defined as ________. |
logging into e-mail |
All of the following are ways that can infect your computer with a virus, EXCEPT ________. |
virus signature |
A(n) ________ is the portion of virus code that is unique to a particular computer virus. |
Spyeye Mobile Banking |
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information. |
launch a denial of service (DoS) attack on your computer |
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. |
snakes |
All of the following are categories of viruses, EXCEPT ________. |
a firewall |
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. |
Boot-sector |
________ viruses are often transmitted by a flash drive left in a USB port. |
Time Bomb |
A ________ is a virus that is triggered on a certain date. |
A DDoS attack |
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
worm |
A(n) ________ takes advantage of file transport methods to spread on their own. |
logical port blocking |
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. |
polymorphic |
A ________ virus changes its own code or periodically rewrites itself to avoid detection. |
keep your password written down and stored in any easy-to-remember location |
Rules for creating passwords include all of the following, EXCEPT ________. |
Completely Automated Public Turing Test to Tell Computers and Humans Apart |
CAPTCHA stands for ________. |
grayware |
Adware and spyware are referred to collectively as ________. |
assassinating all viruses |
All of the following are the main functions of antivirus software, EXCEPT ________. |
Spyware |
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. |
White-hat |
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. |
Cookies obtain your personal information by searching your hard drive. |
Which of the following statements about cookies is NOT true? |
firewall |
A ________ is named after a housing construction feature that slows the spread of fires from house to house. |
engineering |
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
DNS |
The protocol using port 53 is ________. |
Power surges can be blocked by using a computer surround. |
Which of these statements about physically protecting your computer is FALSE? |
pharming |
When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________. |
Cyberloafing |
Using your computer for non-work activities while you are being paid to do your job is known as ________. |
TIA-Chapter 9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price