Exam 9: Threats to Your Digital Life

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

Free
(Short Answer)
4.7/5
(22)
Correct Answer:
Verified

Scripts

A(n) ________ is a program that analyzes the contents of data packets on a network.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

________ is software that has a malicious intent.

Free
(Short Answer)
4.7/5
(39)
Correct Answer:
Verified

Malware

Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

(Multiple Choice)
4.9/5
(38)

Which of the following statements is NOT true about identity theft?

(Multiple Choice)
4.8/5
(39)

________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.

(Short Answer)
4.7/5
(32)

________ are new browser windows launched by a website.

(Short Answer)
4.8/5
(42)

A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.

(Short Answer)
4.9/5
(29)

Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

(Multiple Choice)
4.8/5
(34)

Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

(Multiple Choice)
4.9/5
(33)

Which of the following virus types changes its own code to avoid detection?

(Multiple Choice)
4.7/5
(41)

These are all important protective measures for preventing viruses EXCEPT ________.

(Multiple Choice)
4.8/5
(32)

________ tries to convince you that your computer is infected.

(Short Answer)
4.8/5
(47)

Which of the following are considered slightly different from viruses because they can run without user interaction?

(Multiple Choice)
4.8/5
(40)

A virus hidden in a website is known as a(n) ________,

(Multiple Choice)
4.9/5
(30)

Anyone who breaks into a computer system is known as a(n) ________.

(Short Answer)
4.7/5
(36)

The most common occurrence of identity compromise is through ________.

(Multiple Choice)
4.8/5
(29)

All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

(Multiple Choice)
4.9/5
(33)

A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.

(Short Answer)
4.9/5
(40)

Match each of the following terms to its definition: I. worm II. Trojan horse III. multipartite virus IV. packet sniffer V. polymorphic virus A. a program that examines the contents of all network traffic B. attempts to travel between systems through network connections to spread an infection C. a virus that changes its own code to avoid detection D. attempts to infect computers through multiple methods E. appears to be useful but does something malicious in the background

(Short Answer)
4.9/5
(33)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)