Filters
Question type

Study Flashcards

A virus signature is a portion of virus code that is unique to a particular computer virus.

Correct Answer

verifed

verified

Adware and spyware are referred to collectively as ________.


A) viruses
B) grayware
C) alertware
D) firmware

Correct Answer

verifed

verified

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.


A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software

Correct Answer

verifed

verified

A ________ is a virus that is attached to documents such as Word or Excel files.


A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse

Correct Answer

verifed

verified

________ is a program that gathers information about your surfing habits without your knowledge.


A) Adware
B) Ghostware
C) Shareware
D) Spyware

Correct Answer

verifed

verified

Using your computer for non-work activities while you are being paid to work is known as ________.


A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking

Correct Answer

verifed

verified

A ________ is a virus that is triggered on a certain date.


A) worm
B) macro
C) logic bomb
D) time bomb

Correct Answer

verifed

verified

FBI-related scams involve ________.


A) people pretending to represent official organizations
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods

Correct Answer

verifed

verified

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.


A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking

Correct Answer

verifed

verified

All viruses cause serious destruction of computer data.

Correct Answer

verifed

verified

Which of the following is NOT a virus category?


A) worm
B) logic bomb
C) macro
D) pharming

Correct Answer

verifed

verified

Another name for a sniffer is a(n) ________ analyzer.

Correct Answer

verifed

verified

An encryption virus replicates itself onto a hard drive's master boot record.

Correct Answer

verifed

verified

Most often, hackers initiate a DDoS attack by creating and activating ________ computers.

Correct Answer

verifed

verified

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.


A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit

Correct Answer

verifed

verified

Showing 61 - 75 of 75

Related Exams

Show Answer