TIA-Chapter 9

child pornography

All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________.

Cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

FBI and National White Collar Crime Center

IC3 is a partnership between the ________.

A time bomb

Which type of virus was the famous Michelangelo virus?

people pretending to represent official organizations

FBI-related scams involve ________.

macro virus

A ________ is a virus that is attached to documents such as Word or Excel files.

theft of a cell phone

All of the following are considered cybercrimes, EXCEPT ________.

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection?

computer viruses

Creating and disseminating ________ is one of the most widespread types of cybercrimes

placing a found virus in a secure area on the hard drive

With regard to computer protection, quarantining is defined as ________.

logging into e-mail

All of the following are ways that can infect your computer with a virus, EXCEPT ________.

virus signature

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

Spyeye Mobile Banking

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.

launch a denial of service (DoS) attack on your computer

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.

snakes

All of the following are categories of viruses, EXCEPT ________.

a firewall

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

Boot-sector

________ viruses are often transmitted by a flash drive left in a USB port.

Time Bomb

A ________ is a virus that is triggered on a certain date.

A DDoS attack

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

worm

A(n) ________ takes advantage of file transport methods to spread on their own.

logical port blocking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

polymorphic

A ________ virus changes its own code or periodically rewrites itself to avoid detection.

keep your password written down and stored in any easy-to-remember location

Rules for creating passwords include all of the following, EXCEPT ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAPTCHA stands for ________.

grayware

Adware and spyware are referred to collectively as ________.

assassinating all viruses

All of the following are the main functions of antivirus software, EXCEPT ________.

Spyware

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.

White-hat

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

Cookies obtain your personal information by searching your hard drive.

Which of the following statements about cookies is NOT true?

firewall

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

engineering

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

DNS

The protocol using port 53 is ________.

Power surges can be blocked by using a computer surround.

Which of these statements about physically protecting your computer is FALSE?

pharming

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.

Cyberloafing

Using your computer for non-work activities while you are being paid to do your job is known as ________.

TIA-Chapter 9 - Subjecto.com

TIA-Chapter 9

Your page rank:

Total word count: 583
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

child pornography

All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________.

Cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

FBI and National White Collar Crime Center

IC3 is a partnership between the ________.

A time bomb

Which type of virus was the famous Michelangelo virus?

people pretending to represent official organizations

FBI-related scams involve ________.

macro virus

A ________ is a virus that is attached to documents such as Word or Excel files.

theft of a cell phone

All of the following are considered cybercrimes, EXCEPT ________.

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection?

computer viruses

Creating and disseminating ________ is one of the most widespread types of cybercrimes

placing a found virus in a secure area on the hard drive

With regard to computer protection, quarantining is defined as ________.

logging into e-mail

All of the following are ways that can infect your computer with a virus, EXCEPT ________.

virus signature

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

Spyeye Mobile Banking

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.

launch a denial of service (DoS) attack on your computer

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.

snakes

All of the following are categories of viruses, EXCEPT ________.

a firewall

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

Boot-sector

________ viruses are often transmitted by a flash drive left in a USB port.

Time Bomb

A ________ is a virus that is triggered on a certain date.

A DDoS attack

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

worm

A(n) ________ takes advantage of file transport methods to spread on their own.

logical port blocking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

polymorphic

A ________ virus changes its own code or periodically rewrites itself to avoid detection.

keep your password written down and stored in any easy-to-remember location

Rules for creating passwords include all of the following, EXCEPT ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

CAPTCHA stands for ________.

grayware

Adware and spyware are referred to collectively as ________.

assassinating all viruses

All of the following are the main functions of antivirus software, EXCEPT ________.

Spyware

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.

White-hat

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

Cookies obtain your personal information by searching your hard drive.

Which of the following statements about cookies is NOT true?

firewall

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

engineering

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

DNS

The protocol using port 53 is ________.

Power surges can be blocked by using a computer surround.

Which of these statements about physically protecting your computer is FALSE?

pharming

When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________.

Cyberloafing

Using your computer for non-work activities while you are being paid to do your job is known as ________.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending