Filters
Question type

Study Flashcards

A(n) ________ is the portion of virus code that is unique to a particular computer virus.


A) virus signature
B) encryption code
C) compression code
D) virus pattern

Correct Answer

verifed

verified

The most common kind of pretexting in cyberspace is ________.

Correct Answer

verifed

verified

Another name for a sniffer is a(n)________ analyzer.

Correct Answer

verifed

verified

Using your computer for non-work activities while you are being paid to work is known as ________.


A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking

Correct Answer

verifed

verified

Which type of virus was the famous Michelangelo virus?


A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus

Correct Answer

verifed

verified

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

Correct Answer

verifed

verified

A worm does NOT require human interaction to spread to other computers.

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
spyware
zombie
scareware
spear phishing
rootkit
Responses
malware on your computer used to convince you that your computer has a virus
a computer controlled by a hacker
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
transmits information about you, such as your Internet-surfing habits
programs that allow hackers to gain access to your computer without your knowledge

Correct Answer

spyware
zombie
scareware
spear phishing
rootkit

The Internet Crime Complaint Center (IC3) is a partnership between the ________.


A) FBI and local police departments
B) FBI and National Defense Department
C) FBI and National White Collar Crime Center
D) National White Collar Crime Center and U.S. Department of Defense

Correct Answer

verifed

verified

Creating and spreading online viruses is a cybercrime.

Correct Answer

verifed

verified

Ethical hackers are also known as white-hat hackers.

Correct Answer

verifed

verified

A ________ is a virus that is triggered on a certain date.


A) worm
B) macro
C) logic bomb
D) time bomb

Correct Answer

verifed

verified

Creating and distributing ________ is one of the most widespread types of cybercrimes.


A) spam
B) computer viruses
C) cookies
D) zombies

Correct Answer

verifed

verified

________ is malware that tries to convince you that your computer is infected with a virus.

Correct Answer

verifed

verified

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.


A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer

Correct Answer

verifed

verified

The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.

Correct Answer

verifed

verified

The most financially damaging cybercrime affecting individuals is ________.

Correct Answer

verifed

verified

A(n) ________ takes advantage of file transport methods to spread on its own.


A) worm
B) script virus
C) encryption virus
D) macro virus

Correct Answer

verifed

verified

CAPTCHA stands for ________.


A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart
B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart

Correct Answer

verifed

verified

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.


A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting

Correct Answer

verifed

verified

Showing 21 - 40 of 75

Related Exams

Show Answer