Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Creating and spreading online viruses is a cybercrime.

(True/False)
5.0/5
(37)

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

(Multiple Choice)
4.8/5
(38)

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

(Multiple Choice)
4.9/5
(39)
Match each of the following terms to its meaning:
packet filtering
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
CAPTCHA
method for selectively allowing certain requests to access ports
Correct Answer:
Verified
Premises:
Responses:
packet filtering
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
CAPTCHA
method for selectively allowing certain requests to access ports
biometric authentication device
program that generates distorted text and requires that it be typed into a box
firewall
reads a unique personal characteristic and converts its pattern to a digital code
(Matching)
4.8/5
(37)

A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

(Short Answer)
4.7/5
(35)

A macro virus is a virus that is attached to a file.

(True/False)
5.0/5
(33)

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

(Multiple Choice)
4.8/5
(34)

A stealth virus is designed to infect multiple file types to fool the antivirus software.

(True/False)
4.9/5
(31)

All of the following are top cybercrimes reported to the IC3 EXCEPT ________.

(Multiple Choice)
4.8/5
(39)
Match each of the following terms to its meaning:
zombie
a computer controlled by a hacker
rootkit
malware on your computer used to convince you that your computer has a virus
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
Correct Answer:
Verified
Premises:
Responses:
zombie
a computer controlled by a hacker
rootkit
malware on your computer used to convince you that your computer has a virus
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
program that allows hackers to gain access to your computer without your knowledge
spyware
transmits information about you, such as your Internet-surfing habits
(Matching)
4.9/5
(41)

Using your computer for non-work activities while you are being paid to work is known as ________.

(Multiple Choice)
4.7/5
(30)

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

(Short Answer)
4.8/5
(34)

Ethical hackers are also known as white-hat hackers.

(True/False)
4.9/5
(34)

Since you can always redownload program files, you do not need to include them in backups.

(True/False)
4.7/5
(42)

All viruses cause serious destruction of computer data.

(True/False)
4.7/5
(42)

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

(Multiple Choice)
4.8/5
(34)

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

(Multiple Choice)
4.9/5
(27)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Multiple Choice)
4.9/5
(28)

________ is a program that gathers information about your surfing habits without your knowledge.

(Multiple Choice)
4.8/5
(26)

A virus signature is a portion of virus code that is unique to a particular computer virus.

(True/False)
4.9/5
(46)
Showing 41 - 60 of 76
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)