Deck 9: Securing Your System: Protecting Your Digital Data and Devices

ملء الشاشة (f)
exit full mode
سؤال
________ viruses are often transmitted by a flash drive left in a USB port.

A) Logic bomb
B) Boot-sector
C) Macro
D) Time bomb
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
FBI-related scams involve ________.

A) people pretending to represent official organizations such as the Dept. of Homeland Security
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
سؤال
All of the following activities may infect your computer with a virus EXCEPT ________.

A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) installing a manufacturer's printer driver
سؤال
A(n)________ takes advantage of file transport methods to spread on its own.

A) worm
B) script virus
C) encryption virus
D) macro virus
سؤال
The Internet Crime Complaint Center (IC3)is a partnership between the ________.

A) FBI and local police departments
B) FBI and National Defense Department
C) FBI and National White Collar Crime Center
D) National White Collar Crime Center and U.S. Department of Defense
سؤال
A(n)________ is the portion of virus code that is unique to a particular computer virus.

A) virus signature
B) encryption code
C) compression code
D) virus pattern
سؤال
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.

A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
سؤال
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
سؤال
A ________ is a virus that is attached to documents such as Word or Excel files.

A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
سؤال
Creating and distributing ________ is one of the most widespread types of cybercrimes.

A) spam
B) computer viruses
C) cookies
D) zombies
سؤال
Which of the following is NOT a virus category?

A) worm
B) logic bomb
C) macro
D) pharming
سؤال
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

A) a packet sniffer
B) a personal firewall
C) a packet filter
D) antivirus software
سؤال
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
سؤال
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
سؤال
Which type of virus was the famous Michelangelo virus?

A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
سؤال
A ________ is a virus that is triggered on a certain date.

A) worm
B) macro
C) logic bomb
D) time bomb
سؤال
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

A) Black-hat
B) Gray-hat
C) White-hat
D) Green-hat
سؤال
Which of the following classifications of viruses can change its own code to avoid detection?

A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
سؤال
With regard to computer protection, quarantining is defined as ________.

A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
سؤال
All of the following were top cybercrimes reported to the IC3 in 2013 EXCEPT ________.

A) identity theft
B) non-auction scam
C) advance fee fraud
D) theft of services
سؤال
Adware and spyware are referred to collectively as ________.

A) viruses
B) grayware
C) alertware
D) firmware
سؤال
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

A) phishing
B) pharming
C) pretexting
D) polymorphing
سؤال
Using your computer for non-work activities while you are being paid to work is known as ________.

A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
سؤال
________ occur when a website downloads harmful software onto your computer.
سؤال
Another name for bots is ________.
سؤال
A(n)________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
سؤال
A ________ is named after a housing construction feature that slows the spread of fires from house to house.

A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
سؤال
A(n)________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
سؤال
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
سؤال
________ is a program that gathers information about your surfing habits without your knowledge.

A) Adware
B) Ghostware
C) Shareware
D) Spyware
سؤال
The most financially damaging cybercrime affecting individuals is ________.
سؤال
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A) engineering
B) theft
C) pretexting
D) pharming
سؤال
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
سؤال
CAPTCHA stands for ________.

A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
سؤال
A(n)________ virus is designed to infect multiple file types in an effort to fool antivirus software.
سؤال
Which of the following statements about cookies is NOT true?

A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
سؤال
Rules for creating passwords include all of the following EXCEPT ________.

A) keep your password a secret
B) change your password frequently
C) use a dictionary to find a lengthy word that is easy to remember
D) use letters, numbers and symbols in your passwords
سؤال
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
سؤال
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
سؤال
A(n)________ virus is a series of commands that is executed without your knowledge.
سؤال
Most often, hackers initiate a DDoS attack by creating and activating ________ computers.
سؤال
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
سؤال
A(n)________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
سؤال
Another name for a sniffer is a(n)________ analyzer.
سؤال
All viruses cause serious destruction of computer data.
سؤال
The most common kind of pretexting in cyberspace is ________.
سؤال
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
سؤال
Unwanted, unsolicited e-mail is referred to as ________.
سؤال
A time bomb virus can be triggered on a certain date.
سؤال
Creating and spreading online viruses is a cybercrime.
سؤال
A virus signature is a portion of virus code that is unique to a particular computer virus.
سؤال
A(n)________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
سؤال
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
سؤال
________ is malware that tries to convince you that your computer is infected with a virus.
سؤال
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
سؤال
The terms virus and worm actually mean the same thing.
سؤال
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
سؤال
A(n)________ can help block unwanted, unsolicited e-mail.
سؤال
A(n)________ protects a computer against power surges.
سؤال
A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
سؤال
A worm does NOT require human interaction to spread to other computers.
سؤال
You should use the same password for each system or website you need to access.
سؤال
A denial-of-service attack can be used to deny hackers access to a computer system.
سؤال
The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.
سؤال
A zombie is another person's computer controlled by a hacker.
سؤال
Currently, there are no antivirus programs for mobile devices.
سؤال
Ethical hackers are also known as white-hat hackers.
سؤال
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
سؤال
An encryption virus replicates itself onto a hard drive's master boot record.
سؤال
A stealth virus is designed to infect multiple file types to fool the antivirus software.
سؤال
Match between columns
pretexting
program that appears to be something useful or desirable
pretexting
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
text file for storing personal preferences pertaining to websites
pretexting
programs that run on a large number of zombie computers
pretexting
virus that is triggered by the passage of time or on a certain date
Trojan horse
program that appears to be something useful or desirable
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
Trojan horse
text file for storing personal preferences pertaining to websites
Trojan horse
programs that run on a large number of zombie computers
Trojan horse
virus that is triggered by the passage of time or on a certain date
time bomb
program that appears to be something useful or desirable
time bomb
creating a scenario that sounds legitimate enough that someone will trust you
time bomb
text file for storing personal preferences pertaining to websites
time bomb
programs that run on a large number of zombie computers
time bomb
virus that is triggered by the passage of time or on a certain date
botnet
program that appears to be something useful or desirable
botnet
creating a scenario that sounds legitimate enough that someone will trust you
botnet
text file for storing personal preferences pertaining to websites
botnet
programs that run on a large number of zombie computers
botnet
virus that is triggered by the passage of time or on a certain date
cookie
program that appears to be something useful or desirable
cookie
creating a scenario that sounds legitimate enough that someone will trust you
cookie
text file for storing personal preferences pertaining to websites
cookie
programs that run on a large number of zombie computers
cookie
virus that is triggered by the passage of time or on a certain date
سؤال
Match between columns
black-hat hacker
flaunts expertise to the administrator of a system
black-hat hacker
an unethical hacker
black-hat hacker
using an employer's computer for nonwork activities
black-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
black-hat hacker
an "ethical" hacker
grey-hat hacker
flaunts expertise to the administrator of a system
grey-hat hacker
an unethical hacker
grey-hat hacker
using an employer's computer for nonwork activities
grey-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
grey-hat hacker
an "ethical" hacker
white-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an unethical hacker
white-hat hacker
using an employer's computer for nonwork activities
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
white-hat hacker
an "ethical" hacker
social engineering
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
social engineering
using an employer's computer for nonwork activities
social engineering
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
an "ethical" hacker
cyberloafing
flaunts expertise to the administrator of a system
cyberloafing
an unethical hacker
cyberloafing
using an employer's computer for nonwork activities
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
cyberloafing
an "ethical" hacker
سؤال
Match between columns
geotag
method for selectively allowing certain requests to access ports
geotag
a computer's identity on the Internet
geotag
hardware or software for protecting computers from hackers
geotag
program that generates distorted text and require that it be typed into a box
geotag
data attached to a photo that indicates when/where the photo was taken
firewall
method for selectively allowing certain requests to access ports
firewall
a computer's identity on the Internet
firewall
hardware or software for protecting computers from hackers
firewall
program that generates distorted text and require that it be typed into a box
firewall
data attached to a photo that indicates when/where the photo was taken
IP address
method for selectively allowing certain requests to access ports
IP address
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
IP address
program that generates distorted text and require that it be typed into a box
IP address
data attached to a photo that indicates when/where the photo was taken
CAPTCHA
method for selectively allowing certain requests to access ports
CAPTCHA
a computer's identity on the Internet
CAPTCHA
hardware or software for protecting computers from hackers
CAPTCHA
program that generates distorted text and require that it be typed into a box
CAPTCHA
data attached to a photo that indicates when/where the photo was taken
packet filtering
method for selectively allowing certain requests to access ports
packet filtering
a computer's identity on the Internet
packet filtering
hardware or software for protecting computers from hackers
packet filtering
program that generates distorted text and require that it be typed into a box
packet filtering
data attached to a photo that indicates when/where the photo was taken
سؤال
Match between columns
polymorphic virus
attempts to travel between systems through network connections to spread an infection
polymorphic virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
a program that renders your computer files unusable by compressing them
polymorphic virus
virus that changes its own code to avoid detection
polymorphic virus
virus that is triggered when a file is opened or program is started a certain number of times
worm
attempts to travel between systems through network connections to spread an infection
worm
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
worm
a program that renders your computer files unusable by compressing them
worm
virus that changes its own code to avoid detection
worm
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
attempts to travel between systems through network connections to spread an infection
computer virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
computer virus
a program that renders your computer files unusable by compressing them
computer virus
virus that changes its own code to avoid detection
computer virus
virus that is triggered when a file is opened or program is started a certain number of times
encryption virus
attempts to travel between systems through network connections to spread an infection
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
encryption virus
a program that renders your computer files unusable by compressing them
encryption virus
virus that changes its own code to avoid detection
encryption virus
virus that is triggered when a file is opened or program is started a certain number of times
logic bomb
attempts to travel between systems through network connections to spread an infection
logic bomb
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
logic bomb
a program that renders your computer files unusable by compressing them
logic bomb
virus that changes its own code to avoid detection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
سؤال
Match between columns
spyware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spyware
programs that allow hackers to gain access to your computer without your knowledge
spyware
malware on your computer used to convince you that your computer has a virus
spyware
a computer controlled by a hacker
spyware
transmits information about you, such as your Internet-surfing habits
zombie
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
zombie
programs that allow hackers to gain access to your computer without your knowledge
zombie
malware on your computer used to convince you that your computer has a virus
zombie
a computer controlled by a hacker
zombie
transmits information about you, such as your Internet-surfing habits
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
scareware
programs that allow hackers to gain access to your computer without your knowledge
scareware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
scareware
transmits information about you, such as your Internet-surfing habits
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
programs that allow hackers to gain access to your computer without your knowledge
spear phishing
malware on your computer used to convince you that your computer has a virus
spear phishing
a computer controlled by a hacker
spear phishing
transmits information about you, such as your Internet-surfing habits
rootkit
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
programs that allow hackers to gain access to your computer without your knowledge
rootkit
malware on your computer used to convince you that your computer has a virus
rootkit
a computer controlled by a hacker
rootkit
transmits information about you, such as your Internet-surfing habits
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Securing Your System: Protecting Your Digital Data and Devices
1
________ viruses are often transmitted by a flash drive left in a USB port.

A) Logic bomb
B) Boot-sector
C) Macro
D) Time bomb
B
2
FBI-related scams involve ________.

A) people pretending to represent official organizations such as the Dept. of Homeland Security
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
A
3
All of the following activities may infect your computer with a virus EXCEPT ________.

A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) installing a manufacturer's printer driver
D
4
A(n)________ takes advantage of file transport methods to spread on its own.

A) worm
B) script virus
C) encryption virus
D) macro virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Internet Crime Complaint Center (IC3)is a partnership between the ________.

A) FBI and local police departments
B) FBI and National Defense Department
C) FBI and National White Collar Crime Center
D) National White Collar Crime Center and U.S. Department of Defense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n)________ is the portion of virus code that is unique to a particular computer virus.

A) virus signature
B) encryption code
C) compression code
D) virus pattern
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.

A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ________ is a virus that is attached to documents such as Word or Excel files.

A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
Creating and distributing ________ is one of the most widespread types of cybercrimes.

A) spam
B) computer viruses
C) cookies
D) zombies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT a virus category?

A) worm
B) logic bomb
C) macro
D) pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

A) a packet sniffer
B) a personal firewall
C) a packet filter
D) antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which type of virus was the famous Michelangelo virus?

A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ________ is a virus that is triggered on a certain date.

A) worm
B) macro
C) logic bomb
D) time bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

A) Black-hat
B) Gray-hat
C) White-hat
D) Green-hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following classifications of viruses can change its own code to avoid detection?

A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
With regard to computer protection, quarantining is defined as ________.

A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
All of the following were top cybercrimes reported to the IC3 in 2013 EXCEPT ________.

A) identity theft
B) non-auction scam
C) advance fee fraud
D) theft of services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
Adware and spyware are referred to collectively as ________.

A) viruses
B) grayware
C) alertware
D) firmware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

A) phishing
B) pharming
C) pretexting
D) polymorphing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
Using your computer for non-work activities while you are being paid to work is known as ________.

A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
________ occur when a website downloads harmful software onto your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
Another name for bots is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
A(n)________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
A ________ is named after a housing construction feature that slows the spread of fires from house to house.

A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ is a program that gathers information about your surfing habits without your knowledge.

A) Adware
B) Ghostware
C) Shareware
D) Spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
The most financially damaging cybercrime affecting individuals is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A) engineering
B) theft
C) pretexting
D) pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
CAPTCHA stands for ________.

A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n)________ virus is designed to infect multiple file types in an effort to fool antivirus software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following statements about cookies is NOT true?

A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
Rules for creating passwords include all of the following EXCEPT ________.

A) keep your password a secret
B) change your password frequently
C) use a dictionary to find a lengthy word that is easy to remember
D) use letters, numbers and symbols in your passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n)________ virus is a series of commands that is executed without your knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
Most often, hackers initiate a DDoS attack by creating and activating ________ computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
A(n)________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
Another name for a sniffer is a(n)________ analyzer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
All viruses cause serious destruction of computer data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
The most common kind of pretexting in cyberspace is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Unwanted, unsolicited e-mail is referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
A time bomb virus can be triggered on a certain date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
Creating and spreading online viruses is a cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
A virus signature is a portion of virus code that is unique to a particular computer virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
A(n)________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
________ is malware that tries to convince you that your computer is infected with a virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
The terms virus and worm actually mean the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n)________ can help block unwanted, unsolicited e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
A(n)________ protects a computer against power surges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
A worm does NOT require human interaction to spread to other computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
You should use the same password for each system or website you need to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
A denial-of-service attack can be used to deny hackers access to a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
A zombie is another person's computer controlled by a hacker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
Currently, there are no antivirus programs for mobile devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
Ethical hackers are also known as white-hat hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
An encryption virus replicates itself onto a hard drive's master boot record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
A stealth virus is designed to infect multiple file types to fool the antivirus software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Match between columns
pretexting
program that appears to be something useful or desirable
pretexting
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
text file for storing personal preferences pertaining to websites
pretexting
programs that run on a large number of zombie computers
pretexting
virus that is triggered by the passage of time or on a certain date
Trojan horse
program that appears to be something useful or desirable
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
Trojan horse
text file for storing personal preferences pertaining to websites
Trojan horse
programs that run on a large number of zombie computers
Trojan horse
virus that is triggered by the passage of time or on a certain date
time bomb
program that appears to be something useful or desirable
time bomb
creating a scenario that sounds legitimate enough that someone will trust you
time bomb
text file for storing personal preferences pertaining to websites
time bomb
programs that run on a large number of zombie computers
time bomb
virus that is triggered by the passage of time or on a certain date
botnet
program that appears to be something useful or desirable
botnet
creating a scenario that sounds legitimate enough that someone will trust you
botnet
text file for storing personal preferences pertaining to websites
botnet
programs that run on a large number of zombie computers
botnet
virus that is triggered by the passage of time or on a certain date
cookie
program that appears to be something useful or desirable
cookie
creating a scenario that sounds legitimate enough that someone will trust you
cookie
text file for storing personal preferences pertaining to websites
cookie
programs that run on a large number of zombie computers
cookie
virus that is triggered by the passage of time or on a certain date
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
Match between columns
black-hat hacker
flaunts expertise to the administrator of a system
black-hat hacker
an unethical hacker
black-hat hacker
using an employer's computer for nonwork activities
black-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
black-hat hacker
an "ethical" hacker
grey-hat hacker
flaunts expertise to the administrator of a system
grey-hat hacker
an unethical hacker
grey-hat hacker
using an employer's computer for nonwork activities
grey-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
grey-hat hacker
an "ethical" hacker
white-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an unethical hacker
white-hat hacker
using an employer's computer for nonwork activities
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
white-hat hacker
an "ethical" hacker
social engineering
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
social engineering
using an employer's computer for nonwork activities
social engineering
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
an "ethical" hacker
cyberloafing
flaunts expertise to the administrator of a system
cyberloafing
an unethical hacker
cyberloafing
using an employer's computer for nonwork activities
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
cyberloafing
an "ethical" hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
Match between columns
geotag
method for selectively allowing certain requests to access ports
geotag
a computer's identity on the Internet
geotag
hardware or software for protecting computers from hackers
geotag
program that generates distorted text and require that it be typed into a box
geotag
data attached to a photo that indicates when/where the photo was taken
firewall
method for selectively allowing certain requests to access ports
firewall
a computer's identity on the Internet
firewall
hardware or software for protecting computers from hackers
firewall
program that generates distorted text and require that it be typed into a box
firewall
data attached to a photo that indicates when/where the photo was taken
IP address
method for selectively allowing certain requests to access ports
IP address
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
IP address
program that generates distorted text and require that it be typed into a box
IP address
data attached to a photo that indicates when/where the photo was taken
CAPTCHA
method for selectively allowing certain requests to access ports
CAPTCHA
a computer's identity on the Internet
CAPTCHA
hardware or software for protecting computers from hackers
CAPTCHA
program that generates distorted text and require that it be typed into a box
CAPTCHA
data attached to a photo that indicates when/where the photo was taken
packet filtering
method for selectively allowing certain requests to access ports
packet filtering
a computer's identity on the Internet
packet filtering
hardware or software for protecting computers from hackers
packet filtering
program that generates distorted text and require that it be typed into a box
packet filtering
data attached to a photo that indicates when/where the photo was taken
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Match between columns
polymorphic virus
attempts to travel between systems through network connections to spread an infection
polymorphic virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
a program that renders your computer files unusable by compressing them
polymorphic virus
virus that changes its own code to avoid detection
polymorphic virus
virus that is triggered when a file is opened or program is started a certain number of times
worm
attempts to travel between systems through network connections to spread an infection
worm
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
worm
a program that renders your computer files unusable by compressing them
worm
virus that changes its own code to avoid detection
worm
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
attempts to travel between systems through network connections to spread an infection
computer virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
computer virus
a program that renders your computer files unusable by compressing them
computer virus
virus that changes its own code to avoid detection
computer virus
virus that is triggered when a file is opened or program is started a certain number of times
encryption virus
attempts to travel between systems through network connections to spread an infection
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
encryption virus
a program that renders your computer files unusable by compressing them
encryption virus
virus that changes its own code to avoid detection
encryption virus
virus that is triggered when a file is opened or program is started a certain number of times
logic bomb
attempts to travel between systems through network connections to spread an infection
logic bomb
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
logic bomb
a program that renders your computer files unusable by compressing them
logic bomb
virus that changes its own code to avoid detection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Match between columns
spyware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spyware
programs that allow hackers to gain access to your computer without your knowledge
spyware
malware on your computer used to convince you that your computer has a virus
spyware
a computer controlled by a hacker
spyware
transmits information about you, such as your Internet-surfing habits
zombie
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
zombie
programs that allow hackers to gain access to your computer without your knowledge
zombie
malware on your computer used to convince you that your computer has a virus
zombie
a computer controlled by a hacker
zombie
transmits information about you, such as your Internet-surfing habits
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
scareware
programs that allow hackers to gain access to your computer without your knowledge
scareware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
scareware
transmits information about you, such as your Internet-surfing habits
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
programs that allow hackers to gain access to your computer without your knowledge
spear phishing
malware on your computer used to convince you that your computer has a virus
spear phishing
a computer controlled by a hacker
spear phishing
transmits information about you, such as your Internet-surfing habits
rootkit
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
programs that allow hackers to gain access to your computer without your knowledge
rootkit
malware on your computer used to convince you that your computer has a virus
rootkit
a computer controlled by a hacker
rootkit
transmits information about you, such as your Internet-surfing habits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.