Deck 9: Threats to Your Digital Life

Full screen (f)
exit full mode
Question
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
Use Space or
up arrow
down arrow
to flip the card.
Question
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Question
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Question
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

A) hacking
B) identity theft
C) perjury
D) creating viruses
Question
A(n) ________ is a program that analyzes the contents of data packets on a network.

A) packet sniffer
B) hacker
C) phisher
D) trojan horse
Question
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

A) telephone number
B) social security number
C) first name
D) date of birth
Question
________ are new browser windows launched by a website.
Question
A virus hidden in a website is known as a(n) ________,

A) script
B) Trojan horse
C) macro
D) multipartite virus
Question
________ is software that has a malicious intent.
Question
Anyone who breaks into a computer system is known as a(n) ________.
Question
Which of the following statements is NOT true about identity theft?

A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
Question
The most common occurrence of identity compromise is through ________.

A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
Question
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
Question
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Question
Which of the following are considered slightly different from viruses because they can run without user interaction?

A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
Question
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
Question
These are all important protective measures for preventing viruses EXCEPT ________.

A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
Question
Which of the following virus types changes its own code to avoid detection?

A) Stealth
B) Macro
C) Polymorphic
D) Encryption
Question
________ tries to convince you that your computer is infected.
Question
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Threats to Your Digital Life
1
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
B, E, D, A, C
2
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Scripts
3
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Pharming
4
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

A) hacking
B) identity theft
C) perjury
D) creating viruses
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ________ is a program that analyzes the contents of data packets on a network.

A) packet sniffer
B) hacker
C) phisher
D) trojan horse
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

A) telephone number
B) social security number
C) first name
D) date of birth
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
________ are new browser windows launched by a website.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
A virus hidden in a website is known as a(n) ________,

A) script
B) Trojan horse
C) macro
D) multipartite virus
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
________ is software that has a malicious intent.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Anyone who breaks into a computer system is known as a(n) ________.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following statements is NOT true about identity theft?

A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
The most common occurrence of identity compromise is through ________.

A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following are considered slightly different from viruses because they can run without user interaction?

A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
These are all important protective measures for preventing viruses EXCEPT ________.

A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following virus types changes its own code to avoid detection?

A) Stealth
B) Macro
C) Polymorphic
D) Encryption
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
________ tries to convince you that your computer is infected.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.