MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Chapter 9 Practice Multiple Choice Quiz
All of the following are ways that can infect your computer with a virus EXCEPT _______.
Report Question
0%
Installing a manufacturers printer driver
0%
Placing a found virus in a secure area on the hard drive
0%
Theft of services
0%
FBI and National White Collar Crime Center
Which type of virus was the famous Michelangelo virus?
Report Question
0%
Polymorphic
0%
Time bomb
0%
Pharming
0%
A time bomb
_______ viruses are often transmitted by a flash drive left in a USB port.
Report Question
0%
Boot-sector
0%
Virus signature
0%
Time bomb
0%
Macro virus
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ______.
Report Question
0%
A firewall
0%
Cybercrime
0%
Engineering
0%
Firewall
With regard to computer protection, quarantining is defined as _________.
Report Question
0%
Placing a found virus in a secure area on the hard drive
0%
Launch a denial of service (DoS) attack on your computer
0%
Cookies obtain your personal information by searching your hard drive
0%
FBI and National White Collar Crime Center
Using your computer for non-work activities while you are being paid to work is known as ______.
Report Question
0%
Cybercrime
0%
Cyberloafing
0%
Polymorphic
0%
Computer viruses
Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Report Question
0%
Firewall
0%
Engineering
0%
Cybercrime
0%
A firewall
FBI-related scams involve ______.
Report Question
0%
Cookies obtain your personal information by searching your hard drive
0%
Placing a found virus in a secure area on the hard drive
0%
Completely Automated Public Turing Test to Tell Computers and Humans Apart
0%
People pretending to represent official organizations
Creating and distributing ____ is one of the most widespread types of cyber crimes.
Report Question
0%
Spyware
0%
Theft of services
0%
Worm
0%
Computer viruses
_____ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
Report Question
0%
Boot-sector
0%
White-hat
0%
Firewall
0%
Rootkit
Adware and spyware are referred to collectively as _______.
Report Question
0%
Spyware
0%
Grayware
0%
Worm
0%
Rootkit
Rules for creating passwords include all of the following EXCEPT ______.
Report Question
0%
Placing a found virus in a secure area on the hard drive
0%
Use a dictionary to find a lengthy word that is easy to remember
0%
FBI and National White Collar Crime Center
0%
Cookies obtain your personal information by searching your hard drive
A _______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
Report Question
0%
Pharming
0%
Worm
0%
Spyware
0%
Rootkit
When malicious code is planted on your computer and alters your browsers ability to find web addresses, it is known as _______.
Report Question
0%
Rootkit
0%
Pharming
0%
Worm
0%
Spyware
_______ is a program that gathers information about your surfing habits without your knowledge.
Report Question
0%
Firewall
0%
Worm
0%
Spyware
0%
Rootkit
CAPTCHA stands for ______.
Report Question
0%
Cookies obtain your personal information by searching your hard drive
0%
People pretending to represent official organizations
0%
Completely Automated Public Turing Test to Tell Computers and Humans Apart
0%
Placing a found virus in a secure area on the hard drive
A ________ is the portion of virus code that is unique to a particular computer virus.
Report Question
0%
Spyware
0%
Virus signature
0%
Rootkit
0%
Pharming
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
Report Question
0%
Placing a found virus in a secure area on the hard drive
0%
FBI and National White Collar Crime Center
0%
Installing a manufacturers printer driver
0%
Use a dictionary to find a lengthy word that is easy to remember
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as _____.
Report Question
0%
Logical port blocking
0%
Rootkit
0%
Virus signature
0%
A firewall
Which of the following classifications of viruses can change its own code to avoid detection?
Report Question
0%
Pharming
0%
Polymorphic
0%
Cybercrime
0%
Theft of services
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page