Exam 9: Securing Your System: Protecting Your Digital Data and Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

inoculation

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

A

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

A(n)________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

(Short Answer)
4.9/5
(43)

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

(Short Answer)
4.9/5
(35)

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

(True/False)
4.8/5
(30)

A time bomb virus can be triggered on a certain date.

(True/False)
4.9/5
(41)

A zombie is another person's computer controlled by a hacker.

(True/False)
4.7/5
(35)

With regard to computer protection, quarantining is defined as ________.

(Multiple Choice)
4.9/5
(40)

A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

(Short Answer)
4.8/5
(24)

________ viruses are often transmitted by a flash drive left in a USB port.

(Multiple Choice)
4.8/5
(41)

A stealth virus is designed to infect multiple file types to fool the antivirus software.

(True/False)
4.9/5
(36)
Match each of the following terms to its meaning:
black-hat hacker
using an employer's computer for nonwork activities
grey-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an "ethical" hacker
Correct Answer:
Verified
Premises:
Responses:
black-hat hacker
using an employer's computer for nonwork activities
grey-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an "ethical" hacker
social engineering
an unethical hacker
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
(Matching)
4.9/5
(35)

A(n)________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

(Short Answer)
4.9/5
(35)

All of the following were top cybercrimes reported to the IC3 in 2013 EXCEPT ________.

(Multiple Choice)
4.9/5
(39)

FBI-related scams involve ________.

(Multiple Choice)
4.9/5
(32)

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

(Short Answer)
4.9/5
(40)
Match each of the following terms to its meaning:
geotag
hardware or software for protecting computers from hackers
firewall
method for selectively allowing certain requests to access ports
IP address
program that generates distorted text and require that it be typed into a box
Correct Answer:
Verified
Premises:
Responses:
geotag
hardware or software for protecting computers from hackers
firewall
method for selectively allowing certain requests to access ports
IP address
program that generates distorted text and require that it be typed into a box
CAPTCHA
data attached to a photo that indicates when/where the photo was taken
packet filtering
a computer's identity on the Internet
(Matching)
4.8/5
(34)

A(n)________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

(Short Answer)
4.9/5
(32)

A(n)________ virus is a series of commands that is executed without your knowledge.

(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)