Deck 9: Threats to Your Digital Life
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 9: Threats to Your Digital Life
1
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
B, E, D, A, C
2
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Scripts
3
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Pharming
4
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.
A) hacking
B) identity theft
C) perjury
D) creating viruses
A) hacking
B) identity theft
C) perjury
D) creating viruses
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ________ is a program that analyzes the contents of data packets on a network.
A) packet sniffer
B) hacker
C) phisher
D) trojan horse
A) packet sniffer
B) hacker
C) phisher
D) trojan horse
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.
A) telephone number
B) social security number
C) first name
D) date of birth
A) telephone number
B) social security number
C) first name
D) date of birth
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
________ are new browser windows launched by a website.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
A virus hidden in a website is known as a(n) ________,
A) script
B) Trojan horse
C) macro
D) multipartite virus
A) script
B) Trojan horse
C) macro
D) multipartite virus
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
________ is software that has a malicious intent.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Anyone who breaks into a computer system is known as a(n) ________.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following statements is NOT true about identity theft?
A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
The most common occurrence of identity compromise is through ________.
A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.
A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following are considered slightly different from viruses because they can run without user interaction?
A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
These are all important protective measures for preventing viruses EXCEPT ________.
A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following virus types changes its own code to avoid detection?
A) Stealth
B) Macro
C) Polymorphic
D) Encryption
A) Stealth
B) Macro
C) Polymorphic
D) Encryption
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
________ tries to convince you that your computer is infected.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck