Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ can help block unwanted, unsolicited e-mail.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

spam filter

A worm does NOT require human interaction to spread to other computers.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

Unwanted, unsolicited e-mail is referred to as ________.

(Short Answer)
4.9/5
(21)

Creating and spreading online viruses is a cybercrime.

(True/False)
5.0/5
(26)

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.

(Multiple Choice)
4.8/5
(31)

You should use the same password for each system or website you need to access.

(True/False)
4.8/5
(36)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Multiple Choice)
4.7/5
(28)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Short Answer)
4.9/5
(30)
Match each of the following terms to its meaning:
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
malware on your computer used to convince you that your computer has a virus
scareware
programs that allow hackers to gain access to your computer without your knowledge
Correct Answer:
Verified
Premises:
Responses:
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
malware on your computer used to convince you that your computer has a virus
scareware
programs that allow hackers to gain access to your computer without your knowledge
spyware
a computer controlled by a hacker
zombie
transmits information about you, such as your Internet-surfing habits
(Matching)
4.8/5
(29)

Rules for creating passwords include all of the following EXCEPT ________.

(Multiple Choice)
4.8/5
(33)

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

(Short Answer)
4.9/5
(32)

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

(Short Answer)
4.9/5
(31)

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.

(Multiple Choice)
4.9/5
(33)

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

(Multiple Choice)
4.9/5
(38)

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

(Multiple Choice)
4.9/5
(28)

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

(Multiple Choice)
4.7/5
(36)

One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.

(Short Answer)
4.8/5
(42)
Match each of the following terms to its meaning:
grey-hat hacker
an "ethical" hacker
white-hat hacker
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
Correct Answer:
Verified
Premises:
Responses:
grey-hat hacker
an "ethical" hacker
white-hat hacker
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
black-hat hacker
using an employer's computer for nonwork activities
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
(Matching)
4.7/5
(26)
Match each of the following terms to its meaning:
time bomb
program that appears to be something useful or desirable
cookie
virus that is triggered by the passage of time or on a certain date
botnet
text file for storing personal preferences pertaining to websites
Correct Answer:
Verified
Premises:
Responses:
time bomb
program that appears to be something useful or desirable
cookie
virus that is triggered by the passage of time or on a certain date
botnet
text file for storing personal preferences pertaining to websites
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
programs that run on a large number of zombie computers
(Matching)
4.8/5
(35)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)