Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

Match each of the following terms to its definition:
packet filtering
a computer controlled by a hacker
firewall
technique of assigning hidden internal IP addresses to protect a network against hackers
zombie
method for selectively allowing certain requests to access a port
Correct Answer:
Verified
Premises:
Responses:
packet filtering
a computer controlled by a hacker
firewall
technique of assigning hidden internal IP addresses to protect a network against hackers
zombie
method for selectively allowing certain requests to access a port
packet sniffer
program used by hackers to look at individual packets as they travel on the Internet
network address translation
hardware or software for protecting computers from hackers
Free
(Matching)
4.8/5
(42)
Correct Answer:
Verified

________ occur when a website downloads harmful software onto your computer.

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

Drive-by downloads, drive by downloads

________ are new browser windows launched by a website.

(Short Answer)
4.9/5
(36)

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

(Multiple Choice)
4.9/5
(35)

A firewall designed specifically for home networks is called a ________ firewall.

(Multiple Choice)
4.9/5
(35)

Which of the following statements about cookies is not true?

(Multiple Choice)
4.8/5
(34)

________ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.

(Short Answer)
4.7/5
(36)

The most common occurrence of identity compromise is through ________.

(Multiple Choice)
4.8/5
(36)

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

(Multiple Choice)
4.8/5
(36)

Another name for a sniffer is a(n) ________ analyzer.

(Short Answer)
4.7/5
(39)

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.

(True/False)
4.9/5
(30)
Match each of the following terms to its definition:
packet sniffer
a virus that changes its own code to avoid detection
polymorphic virus
a program that examines the contents of all network traffic
worm
appears to be useful but does something malicious in the background
Correct Answer:
Verified
Premises:
Responses:
packet sniffer
a virus that changes its own code to avoid detection
polymorphic virus
a program that examines the contents of all network traffic
worm
appears to be useful but does something malicious in the background
Trojan horse
attempts to infect computers through multiple methods
multi-partite virus
attempts to travel between systems through network connections to spread an infection
(Matching)
4.9/5
(31)

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

(Multiple Choice)
4.8/5
(41)

One way to protect your personal information on Facebook is to change your ________ settings.

(Short Answer)
4.8/5
(41)

A full backup and an image backup are the same thing.

(True/False)
4.9/5
(28)

________ floods a computer with requests until it shuts down denying access to legitimate users.

(Multiple Choice)
4.8/5
(42)

________ is a program that gathers information about your surfing habits without your knowledge.

(Multiple Choice)
4.8/5
(32)

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

(Multiple Choice)
4.9/5
(29)

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 135
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)