Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

(Multiple Choice)
4.7/5
(31)

Creating and distributing ________ is one of the most widespread types of cybercrimes.

(Multiple Choice)
4.9/5
(39)

A(n) ________ protects a computer against power surges.

(Short Answer)
4.8/5
(27)

Currently, there are no antivirus programs for mobile devices.

(True/False)
4.8/5
(30)

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

(Short Answer)
4.7/5
(38)

Match each of the following terms to its meaning: I. worm II. computer virus III. encryption virus IV. polymorphic virus V. logic bomb

(Multiple Choice)
4.8/5
(31)

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

(Multiple Choice)
4.8/5
(27)

A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

(Short Answer)
4.9/5
(40)

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

(Multiple Choice)
4.8/5
(37)

Match each of the following terms to its meaning: I. Trojan horse II. pretexting III. cookie IV. botnet V. time bomb

(Multiple Choice)
4.8/5
(30)

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

(Multiple Choice)
4.9/5
(37)

Which is not one of the four key pieces of personal information you should protect from identity thieves?

(Multiple Choice)
4.8/5
(33)

Another name for bots is ________.

(Short Answer)
4.8/5
(31)

All of the following are top cybercrimes reported to the IC3 EXCEPT ________.

(Multiple Choice)
4.8/5
(31)

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

(Short Answer)
4.8/5
(28)

The terms virus and worm mean the same thing.

(True/False)
4.8/5
(29)

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

(Short Answer)
4.8/5
(31)

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

(Multiple Choice)
4.8/5
(35)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Multiple Choice)
4.7/5
(38)

Another name for a sniffer is a(n) ________ analyzer.

(Short Answer)
4.8/5
(23)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)