Deck 9: Securing Your System: Protecting Your Digital Data and Devices

Full screen (f)
exit full mode
Question
Viruses, adware, and spyware are referred to collectively as ________.

A) bloatware
B) grayware
C) alertware
D) firmware
Use Space or
up arrow
down arrow
to flip the card.
Question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
Question
Creating and distributing ________ is one of the most widespread types of cybercrimes.

A) spam
B) computer viruses
C) cookies
D) zombies
Question
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

A) Black-hat
B) Grey-hat
C) White-hat
D) Green-hat
Question
Government impersonation scams involve ________.

A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
Question
A ________ is a virus that is attached to documents.

A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
Question
Which of the following statements about cookies is NOT true?

A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
Question
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

A) worm
B) script virus
C) encryption virus
D) macro virus
Question
All of the following activities may infect your computer with a virus EXCEPT ________.

A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document
Question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
Question
Which of the following classifications of viruses can change its own code to avoid detection?

A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
Question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
Question
All of the following are top cybercrimes reported to the IC3 EXCEPT ________.

A) identity theft
B) non-auction scam
C) advance fee fraud
D) malware fraud
Question
Which type of virus was the famous Michelangelo virus?

A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.

A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense
Question
A ________ is a virus that is triggered on a certain date.

A) worm
B) macro
C) logic bomb
D) time bomb
Question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software
Question
Which of the following is NOT a virus category?

A) Worm
B) Logic bomb
C) Macro
D) Pharming
Question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
Question
________ is a program that gathers information about your surfing habits without your knowledge.

A) Adware
B) Ghostware
C) Shareware
D) Spyware
Question
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
Question
A(n) ________ virus is a series of commands that is executed without your knowledge.
Question
Regarding computer protection, quarantining is defined as ________.

A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
Question
Using your computer for non-work activities while you are being paid to work is known as ________.

A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
Question
A(n) ________ backup makes a copy of all changes since the last backup.

A) incremental
B) full
C) image
D) data
Question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.

A) virus signature
B) encryption code
C) compression code
D) virus pattern
Question
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
Question
Rules for creating passwords include all of the following EXCEPT ________.

A) keep your password a secret
B) change your password frequently
C) keep a master password that is the same for all of your accounts
D) use letters, numbers, and symbols in your passwords
Question
One type of CAPTCHA is ________.

A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus
Question
A botnet is a group of applications running on ________ computers in a DDoS attack.
Question
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
Question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
Question
Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
Question
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
Question
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
Question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

A) phishing
B) pharming
C) pretexting
D) polymorphing
Question
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
Question
A whole-house surge protector is installed ________.

A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers
Question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A) engineering
B) theft
C) pretexting
D) pharming
Question
Which is not one of the four key pieces of personal information you should protect from identity thieves?

A) Social Security number
B) Anniversary
C) Date of birth
D) Street address
Question
________ is malware that tries to convince you that your computer is infected with a virus.
Question
Unwanted, unsolicited e-mail is referred to as ________.
Question
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Question
________ occur when a website downloads harmful software onto your computer.
Question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Question
A(n) ________ protects a computer against power surges.
Question
During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Question
Another name for a sniffer is a(n) ________ analyzer.
Question
________ alarm software is an inexpensive theft deterrent for mobile devices.
Question
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
Question
A(n) ________ can help block unwanted, unsolicited e-mail.
Question
A denial-of-service attack can be used to deny hackers access to a computer system.
Question
All viruses cause serious destruction of computer data.
Question
Ethical hackers are also known as white-hat hackers.
Question
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Question
Creating and spreading online viruses is a cybercrime.
Question
The most common kind of pretexting in cyberspace is ________.
Question
A worm does NOT require human interaction to spread to other computers.
Question
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
Question
One way to protect your personal information on Facebook is to change your ________ settings.
Question
You should use the same password for each system or website you need to access.
Question
A virus signature is a portion of virus code that is unique to a particular computer virus.
Question
Since you can always redownload program files, you do not need to include them in backups.
Question
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
Question
A time bomb virus can be triggered on a certain date.
Question
An encryption virus replicates itself onto a hard drive's master boot record.
Question
Currently, there are no antivirus programs for mobile devices.
Question
The terms virus and worm mean the same thing.
Question
A stealth virus is designed to infect multiple file types to fool the antivirus software.
Question
A macro virus is a virus that is attached to a file.
Question
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
Question
Match between columns
cookie
program that appears to be something useful or desirable
cookie
creating a scenario that sounds legitimate enough that someone will trust you
cookie
text file for storing personal preferences pertaining to websites
cookie
programs that run on a large number of zombie computers
cookie
virus that is triggered by the passage of time or on a certain date
time bomb
program that appears to be something useful or desirable
time bomb
creating a scenario that sounds legitimate enough that someone will trust you
time bomb
text file for storing personal preferences pertaining to websites
time bomb
programs that run on a large number of zombie computers
time bomb
virus that is triggered by the passage of time or on a certain date
pretexting
program that appears to be something useful or desirable
pretexting
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
text file for storing personal preferences pertaining to websites
pretexting
programs that run on a large number of zombie computers
pretexting
virus that is triggered by the passage of time or on a certain date
botnet
program that appears to be something useful or desirable
botnet
creating a scenario that sounds legitimate enough that someone will trust you
botnet
text file for storing personal preferences pertaining to websites
botnet
programs that run on a large number of zombie computers
botnet
virus that is triggered by the passage of time or on a certain date
Trojan horse
program that appears to be something useful or desirable
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
Trojan horse
text file for storing personal preferences pertaining to websites
Trojan horse
programs that run on a large number of zombie computers
Trojan horse
virus that is triggered by the passage of time or on a certain date
Question
Match between columns
black-hat hacker
flaunts expertise to the administrator of a system
black-hat hacker
an unethical hacker
black-hat hacker
using an employer's computer for non-work activities
black-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
black-hat hacker
an ethical hacker
grey-hat hacker
flaunts expertise to the administrator of a system
grey-hat hacker
an unethical hacker
grey-hat hacker
using an employer's computer for non-work activities
grey-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
grey-hat hacker
an ethical hacker
white-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an unethical hacker
white-hat hacker
using an employer's computer for non-work activities
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
white-hat hacker
an ethical hacker
social engineering
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
social engineering
using an employer's computer for non-work activities
social engineering
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
an ethical hacker
cyberloafing
flaunts expertise to the administrator of a system
cyberloafing
an unethical hacker
cyberloafing
using an employer's computer for non-work activities
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
cyberloafing
an ethical hacker
Question
Match between columns
packet filtering
method for selectively allowing certain requests to access ports
packet filtering
a computer's identity on the Internet
packet filtering
hardware or software for protecting computers from hackers
packet filtering
program that generates distorted text and requires that it be typed into a box
packet filtering
reads a unique personal characteristic and converts its pattern to a digital code
IP address
method for selectively allowing certain requests to access ports
IP address
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
IP address
program that generates distorted text and requires that it be typed into a box
IP address
reads a unique personal characteristic and converts its pattern to a digital code
CAPTCHA
method for selectively allowing certain requests to access ports
CAPTCHA
a computer's identity on the Internet
CAPTCHA
hardware or software for protecting computers from hackers
CAPTCHA
program that generates distorted text and requires that it be typed into a box
CAPTCHA
reads a unique personal characteristic and converts its pattern to a digital code
biometric authentication device
method for selectively allowing certain requests to access ports
biometric authentication device
a computer's identity on the Internet
biometric authentication device
hardware or software for protecting computers from hackers
biometric authentication device
program that generates distorted text and requires that it be typed into a box
biometric authentication device
reads a unique personal characteristic and converts its pattern to a digital code
firewall
method for selectively allowing certain requests to access ports
firewall
a computer's identity on the Internet
firewall
hardware or software for protecting computers from hackers
firewall
program that generates distorted text and requires that it be typed into a box
firewall
reads a unique personal characteristic and converts its pattern to a digital code
Question
Match between columns
polymorphic virus
attempts to travel between systems through network connections to spread an infection
polymorphic virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
a program that renders your computer files unusable by compressing them
polymorphic virus
virus that changes its own code to avoid detection
polymorphic virus
virus that is triggered when a file is opened or program is started a certain number of times
logic bomb
attempts to travel between systems through network connections to spread an infection
logic bomb
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
logic bomb
a program that renders your computer files unusable by compressing them
logic bomb
virus that changes its own code to avoid detection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
attempts to travel between systems through network connections to spread an infection
computer virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
computer virus
a program that renders your computer files unusable by compressing them
computer virus
virus that changes its own code to avoid detection
computer virus
virus that is triggered when a file is opened or program is started a certain number of times
encryption virus
attempts to travel between systems through network connections to spread an infection
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
encryption virus
a program that renders your computer files unusable by compressing them
encryption virus
virus that changes its own code to avoid detection
encryption virus
virus that is triggered when a file is opened or program is started a certain number of times
worm
attempts to travel between systems through network connections to spread an infection
worm
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
worm
a program that renders your computer files unusable by compressing them
worm
virus that changes its own code to avoid detection
worm
virus that is triggered when a file is opened or program is started a certain number of times
Question
Match between columns
zombie
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
zombie
program that allows hackers to gain access to your computer without your knowledge
zombie
malware on your computer used to convince you that your computer has a virus
zombie
a computer controlled by a hacker
zombie
transmits information about you, such as your Internet-surfing habits
rootkit
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
program that allows hackers to gain access to your computer without your knowledge
rootkit
malware on your computer used to convince you that your computer has a virus
rootkit
a computer controlled by a hacker
rootkit
transmits information about you, such as your Internet-surfing habits
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
scareware
program that allows hackers to gain access to your computer without your knowledge
scareware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
scareware
transmits information about you, such as your Internet-surfing habits
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
program that allows hackers to gain access to your computer without your knowledge
spear phishing
malware on your computer used to convince you that your computer has a virus
spear phishing
a computer controlled by a hacker
spear phishing
transmits information about you, such as your Internet-surfing habits
spyware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spyware
program that allows hackers to gain access to your computer without your knowledge
spyware
malware on your computer used to convince you that your computer has a virus
spyware
a computer controlled by a hacker
spyware
transmits information about you, such as your Internet-surfing habits
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Securing Your System: Protecting Your Digital Data and Devices
1
Viruses, adware, and spyware are referred to collectively as ________.

A) bloatware
B) grayware
C) alertware
D) firmware
B
2
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
C
3
Creating and distributing ________ is one of the most widespread types of cybercrimes.

A) spam
B) computer viruses
C) cookies
D) zombies
B
4
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

A) Black-hat
B) Grey-hat
C) White-hat
D) Green-hat
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
Government impersonation scams involve ________.

A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
A ________ is a virus that is attached to documents.

A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements about cookies is NOT true?

A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

A) worm
B) script virus
C) encryption virus
D) macro virus
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following activities may infect your computer with a virus EXCEPT ________.

A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following classifications of viruses can change its own code to avoid detection?

A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
All of the following are top cybercrimes reported to the IC3 EXCEPT ________.

A) identity theft
B) non-auction scam
C) advance fee fraud
D) malware fraud
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
Which type of virus was the famous Michelangelo virus?

A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
The Internet Crime Complaint Center (IC3) is a partnership between the ________.

A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
A ________ is a virus that is triggered on a certain date.

A) worm
B) macro
C) logic bomb
D) time bomb
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a virus category?

A) Worm
B) Logic bomb
C) Macro
D) Pharming
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
________ is a program that gathers information about your surfing habits without your knowledge.

A) Adware
B) Ghostware
C) Shareware
D) Spyware
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ________ virus is a series of commands that is executed without your knowledge.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
Regarding computer protection, quarantining is defined as ________.

A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
Using your computer for non-work activities while you are being paid to work is known as ________.

A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ________ backup makes a copy of all changes since the last backup.

A) incremental
B) full
C) image
D) data
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ________ is the portion of virus code that is unique to a particular computer virus.

A) virus signature
B) encryption code
C) compression code
D) virus pattern
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
Rules for creating passwords include all of the following EXCEPT ________.

A) keep your password a secret
B) change your password frequently
C) keep a master password that is the same for all of your accounts
D) use letters, numbers, and symbols in your passwords
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
One type of CAPTCHA is ________.

A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
A botnet is a group of applications running on ________ computers in a DDoS attack.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

A) phishing
B) pharming
C) pretexting
D) polymorphing
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
A whole-house surge protector is installed ________.

A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A) engineering
B) theft
C) pretexting
D) pharming
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
Which is not one of the four key pieces of personal information you should protect from identity thieves?

A) Social Security number
B) Anniversary
C) Date of birth
D) Street address
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
________ is malware that tries to convince you that your computer is infected with a virus.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
Unwanted, unsolicited e-mail is referred to as ________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
________ occur when a website downloads harmful software onto your computer.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ________ protects a computer against power surges.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
Another name for a sniffer is a(n) ________ analyzer.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
________ alarm software is an inexpensive theft deterrent for mobile devices.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
A(n) ________ can help block unwanted, unsolicited e-mail.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
A denial-of-service attack can be used to deny hackers access to a computer system.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
All viruses cause serious destruction of computer data.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
Ethical hackers are also known as white-hat hackers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
Creating and spreading online viruses is a cybercrime.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
The most common kind of pretexting in cyberspace is ________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
A worm does NOT require human interaction to spread to other computers.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
One way to protect your personal information on Facebook is to change your ________ settings.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
You should use the same password for each system or website you need to access.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
A virus signature is a portion of virus code that is unique to a particular computer virus.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
Since you can always redownload program files, you do not need to include them in backups.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
A time bomb virus can be triggered on a certain date.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
An encryption virus replicates itself onto a hard drive's master boot record.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
Currently, there are no antivirus programs for mobile devices.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
The terms virus and worm mean the same thing.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
A stealth virus is designed to infect multiple file types to fool the antivirus software.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
A macro virus is a virus that is attached to a file.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
cookie
program that appears to be something useful or desirable
cookie
creating a scenario that sounds legitimate enough that someone will trust you
cookie
text file for storing personal preferences pertaining to websites
cookie
programs that run on a large number of zombie computers
cookie
virus that is triggered by the passage of time or on a certain date
time bomb
program that appears to be something useful or desirable
time bomb
creating a scenario that sounds legitimate enough that someone will trust you
time bomb
text file for storing personal preferences pertaining to websites
time bomb
programs that run on a large number of zombie computers
time bomb
virus that is triggered by the passage of time or on a certain date
pretexting
program that appears to be something useful or desirable
pretexting
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
text file for storing personal preferences pertaining to websites
pretexting
programs that run on a large number of zombie computers
pretexting
virus that is triggered by the passage of time or on a certain date
botnet
program that appears to be something useful or desirable
botnet
creating a scenario that sounds legitimate enough that someone will trust you
botnet
text file for storing personal preferences pertaining to websites
botnet
programs that run on a large number of zombie computers
botnet
virus that is triggered by the passage of time or on a certain date
Trojan horse
program that appears to be something useful or desirable
Trojan horse
creating a scenario that sounds legitimate enough that someone will trust you
Trojan horse
text file for storing personal preferences pertaining to websites
Trojan horse
programs that run on a large number of zombie computers
Trojan horse
virus that is triggered by the passage of time or on a certain date
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
Match between columns
black-hat hacker
flaunts expertise to the administrator of a system
black-hat hacker
an unethical hacker
black-hat hacker
using an employer's computer for non-work activities
black-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
black-hat hacker
an ethical hacker
grey-hat hacker
flaunts expertise to the administrator of a system
grey-hat hacker
an unethical hacker
grey-hat hacker
using an employer's computer for non-work activities
grey-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
grey-hat hacker
an ethical hacker
white-hat hacker
flaunts expertise to the administrator of a system
white-hat hacker
an unethical hacker
white-hat hacker
using an employer's computer for non-work activities
white-hat hacker
techniques used to manipulate people into performing actions or divulging confidential information
white-hat hacker
an ethical hacker
social engineering
flaunts expertise to the administrator of a system
social engineering
an unethical hacker
social engineering
using an employer's computer for non-work activities
social engineering
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
an ethical hacker
cyberloafing
flaunts expertise to the administrator of a system
cyberloafing
an unethical hacker
cyberloafing
using an employer's computer for non-work activities
cyberloafing
techniques used to manipulate people into performing actions or divulging confidential information
cyberloafing
an ethical hacker
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
packet filtering
method for selectively allowing certain requests to access ports
packet filtering
a computer's identity on the Internet
packet filtering
hardware or software for protecting computers from hackers
packet filtering
program that generates distorted text and requires that it be typed into a box
packet filtering
reads a unique personal characteristic and converts its pattern to a digital code
IP address
method for selectively allowing certain requests to access ports
IP address
a computer's identity on the Internet
IP address
hardware or software for protecting computers from hackers
IP address
program that generates distorted text and requires that it be typed into a box
IP address
reads a unique personal characteristic and converts its pattern to a digital code
CAPTCHA
method for selectively allowing certain requests to access ports
CAPTCHA
a computer's identity on the Internet
CAPTCHA
hardware or software for protecting computers from hackers
CAPTCHA
program that generates distorted text and requires that it be typed into a box
CAPTCHA
reads a unique personal characteristic and converts its pattern to a digital code
biometric authentication device
method for selectively allowing certain requests to access ports
biometric authentication device
a computer's identity on the Internet
biometric authentication device
hardware or software for protecting computers from hackers
biometric authentication device
program that generates distorted text and requires that it be typed into a box
biometric authentication device
reads a unique personal characteristic and converts its pattern to a digital code
firewall
method for selectively allowing certain requests to access ports
firewall
a computer's identity on the Internet
firewall
hardware or software for protecting computers from hackers
firewall
program that generates distorted text and requires that it be typed into a box
firewall
reads a unique personal characteristic and converts its pattern to a digital code
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
Match between columns
polymorphic virus
attempts to travel between systems through network connections to spread an infection
polymorphic virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
a program that renders your computer files unusable by compressing them
polymorphic virus
virus that changes its own code to avoid detection
polymorphic virus
virus that is triggered when a file is opened or program is started a certain number of times
logic bomb
attempts to travel between systems through network connections to spread an infection
logic bomb
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
logic bomb
a program that renders your computer files unusable by compressing them
logic bomb
virus that changes its own code to avoid detection
logic bomb
virus that is triggered when a file is opened or program is started a certain number of times
computer virus
attempts to travel between systems through network connections to spread an infection
computer virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
computer virus
a program that renders your computer files unusable by compressing them
computer virus
virus that changes its own code to avoid detection
computer virus
virus that is triggered when a file is opened or program is started a certain number of times
encryption virus
attempts to travel between systems through network connections to spread an infection
encryption virus
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
encryption virus
a program that renders your computer files unusable by compressing them
encryption virus
virus that changes its own code to avoid detection
encryption virus
virus that is triggered when a file is opened or program is started a certain number of times
worm
attempts to travel between systems through network connections to spread an infection
worm
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
worm
a program that renders your computer files unusable by compressing them
worm
virus that changes its own code to avoid detection
worm
virus that is triggered when a file is opened or program is started a certain number of times
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
Match between columns
zombie
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
zombie
program that allows hackers to gain access to your computer without your knowledge
zombie
malware on your computer used to convince you that your computer has a virus
zombie
a computer controlled by a hacker
zombie
transmits information about you, such as your Internet-surfing habits
rootkit
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
rootkit
program that allows hackers to gain access to your computer without your knowledge
rootkit
malware on your computer used to convince you that your computer has a virus
rootkit
a computer controlled by a hacker
rootkit
transmits information about you, such as your Internet-surfing habits
scareware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
scareware
program that allows hackers to gain access to your computer without your knowledge
scareware
malware on your computer used to convince you that your computer has a virus
scareware
a computer controlled by a hacker
scareware
transmits information about you, such as your Internet-surfing habits
spear phishing
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
program that allows hackers to gain access to your computer without your knowledge
spear phishing
malware on your computer used to convince you that your computer has a virus
spear phishing
a computer controlled by a hacker
spear phishing
transmits information about you, such as your Internet-surfing habits
spyware
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spyware
program that allows hackers to gain access to your computer without your knowledge
spyware
malware on your computer used to convince you that your computer has a virus
spyware
a computer controlled by a hacker
spyware
transmits information about you, such as your Internet-surfing habits
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 76 flashcards in this deck.