Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Multiple Choice)
4.8/5
(34)

A macro virus is a virus that is attached to a file.

(True/False)
4.8/5
(41)

________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

(Short Answer)
4.9/5
(35)

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

(Short Answer)
4.7/5
(32)

Creating and spreading online viruses is a cybercrime.

(True/False)
4.9/5
(23)

Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

(Multiple Choice)
4.8/5
(33)

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.

(Short Answer)
4.9/5
(34)

________ is malware that tries to convince you that your computer is infected with a virus.

(Short Answer)
4.8/5
(33)

Using a ____program, hackers can access and delete all the files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

(Short Answer)
4.9/5
(38)

The terms virus and worm mean the same thing.

(True/False)
4.9/5
(29)
Match each of the following terms to its meaning:
virus
a person who poses a threat to your computer
botnet
prevents intrusion into your computer
hacker
small piece of data that travels through the Internet
Correct Answer:
Verified
Premises:
Responses:
virus
a person who poses a threat to your computer
botnet
prevents intrusion into your computer
hacker
small piece of data that travels through the Internet
packet
group of software programs that usually run independently on a large number of zombie computers
firewall
a small program that can compromise a computer system
(Matching)
4.9/5
(42)

Gray-hat hackers are not doing anything illegal.

(True/False)
4.7/5
(32)

A firewall designed specifically for home networks is called a ________ firewall.

(Short Answer)
4.8/5
(31)

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.

(Short Answer)
4.9/5
(38)

________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.

(Short Answer)
4.8/5
(39)

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

(Multiple Choice)
4.9/5
(37)

A whole-house surge protector is installed ________.

(Multiple Choice)
4.9/5
(38)

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.

(Short Answer)
4.8/5
(25)
Match each of the following terms to its meaning:
zombie
transmits information about you, such as your Internet-surfing habits
spyware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
Correct Answer:
Verified
Premises:
Responses:
zombie
transmits information about you, such as your Internet-surfing habits
spyware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
spear phishing
program that allows hackers to gain access to your computer without your knowledge
rootkit
sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data
(Matching)
4.9/5
(32)

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

(Multiple Choice)
4.7/5
(19)
Showing 41 - 60 of 135
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)