Filters
Question type

Study Flashcards

Another name for a sniffer is a(n) ________ analyzer.

Correct Answer

verifed

verified

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

Correct Answer

verifed

verified

________ is malware that tries to convince you that your computer is infected with a virus.

Correct Answer

verifed

verified

A whole-house surge protector is installed ________.


A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers

Correct Answer

verifed

verified

A denial-of-service attack can be used to deny hackers access to a computer system.

Correct Answer

verifed

verified

A(n) ________ backup makes a copy of all changes since the last backup.


A) incremental
B) full
C) image
D) data

Correct Answer

verifed

verified

One type of CAPTCHA is ________.


A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus

Correct Answer

verifed

verified

Creating and distributing ________ is one of the most widespread types of cybercrimes.


A) spam
B) computer viruses
C) cookies
D) zombies

Correct Answer

verifed

verified

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

Correct Answer

verifed

verified

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

Correct Answer

verifed

verified

Regarding computer protection, quarantining is defined as ________.


A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file

Correct Answer

verifed

verified

A time bomb virus can be triggered on a certain date.

Correct Answer

verifed

verified

During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

Correct Answer

verifed

verified

Which of the following classifications of viruses can change its own code to avoid detection?


A) Stealth
B) Multipartite
C) Polymorphic
D) Worm

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
cookie
time bomb
pretexting
botnet
Trojan horse
Responses
programs that run on a large number of zombie computers
program that appears to be something useful or desirable
virus that is triggered by the passage of time or on a certain date
text file for storing personal preferences pertaining to websites
creating a scenario that sounds legitimate enough that someone will trust you

Correct Answer

cookie
time bomb
pretexting
botnet
Trojan horse

A(n) ________ virus is a series of commands that is executed without your knowledge.

Correct Answer

verifed

verified

Showing 61 - 76 of 76

Related Exams

Show Answer