Filters
Question type

Study Flashcards

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

Correct Answer

verifed

verified

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

Correct Answer

verifed

verified

Another name for a sniffer is a(n) ________ analyzer.

Correct Answer

verifed

verified

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.


A) worm
B) script virus
C) encryption virus
D) macro virus

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


A) engineering
B) theft
C) pretexting
D) pharming

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

All of the following are top cybercrimes reported to the IC3 EXCEPT ________.


A) identity theft
B) non-auction scam
C) advance fee fraud
D) malware fraud

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.


A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A(n) ________ protects a computer against power surges.

Correct Answer

verifed

verified

Match each of the following terms to its meaning: I. worm II. computer virus III. encryption virus IV. polymorphic virus V. logic bomb


A) virus that is triggered when a file is opened or program is started a certain number of times
B) attempts to travel between systems through network connections to spread an infection
C) virus that changes its own code to avoid detection
D) program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
E) a program that renders your computer files unusable by compressing them

F) A) and E)
G) B) and D)

Correct Answer

verifed

verified

A(n) ________ is the portion of virus code that is unique to a particular computer virus.


A) virus signature
B) encryption code
C) compression code
D) virus pattern

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

Correct Answer

verifed

verified

Currently, there are no antivirus programs for mobile devices.

A) True
B) False

Correct Answer

verifed

verified

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.


A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which is not one of the four key pieces of personal information you should protect from identity thieves?


A) Social Security number
B) Anniversary
C) Date of birth
D) Street address

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Match each of the following terms to its meaning: I. Trojan horse II. pretexting III. cookie IV. botnet V. time bomb


A) text file for storing personal preferences pertaining to websites
B) program that appears to be something useful or desirable
C) virus that is triggered by the passage of time or on a certain date
D) creating a scenario that sounds legitimate enough that someone will trust you
E) programs that run on a large number of zombie computers

F) A) and E)
G) C) and D)

Correct Answer

verifed

verified

The terms virus and worm mean the same thing.

A) True
B) False

Correct Answer

verifed

verified

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.


A) Black-hat
B) Grey-hat
C) White-hat
D) Green-hat

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

Correct Answer

verifed

verified

Another name for bots is ________.

Correct Answer

verifed

verified

Creating and distributing ________ is one of the most widespread types of cybercrimes.


A) spam
B) computer viruses
C) cookies
D) zombies

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 75

Related Exams

Show Answer