All of the following are ways that can infect your computer with a virus EXCEPT _______.
  • Installing a manufacturers printer driver
  • Placing a found virus in a secure area on the hard drive
  • Theft of services
  • FBI and National White Collar Crime Center
Which type of virus was the famous Michelangelo virus?
  • Polymorphic
  • Time bomb
  • Pharming
  • A time bomb
_______ viruses are often transmitted by a flash drive left in a USB port.
  • Boot-sector
  • Virus signature
  • Time bomb
  • Macro virus
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ______.
  • A firewall
  • Cybercrime
  • Engineering
  • Firewall
With regard to computer protection, quarantining is defined as _________.
  • Placing a found virus in a secure area on the hard drive
  • Launch a denial of service (DoS) attack on your computer
  • Cookies obtain your personal information by searching your hard drive
  • FBI and National White Collar Crime Center
Using your computer for non-work activities while you are being paid to work is known as ______.
  • Cybercrime
  • Cyberloafing
  • Polymorphic
  • Computer viruses
Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
  • Firewall
  • Engineering
  • Cybercrime
  • A firewall
FBI-related scams involve ______.
  • Cookies obtain your personal information by searching your hard drive
  • Placing a found virus in a secure area on the hard drive
  • Completely Automated Public Turing Test to Tell Computers and Humans Apart
  • People pretending to represent official organizations
Creating and distributing ____ is one of the most widespread types of cyber crimes.
  • Spyware
  • Theft of services
  • Worm
  • Computer viruses
_____ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
  • Boot-sector
  • White-hat
  • Firewall
  • Rootkit
Adware and spyware are referred to collectively as _______.
  • Spyware
  • Grayware
  • Worm
  • Rootkit
Rules for creating passwords include all of the following EXCEPT ______.
  • Placing a found virus in a secure area on the hard drive
  • Use a dictionary to find a lengthy word that is easy to remember
  • FBI and National White Collar Crime Center
  • Cookies obtain your personal information by searching your hard drive
A _______ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
  • Pharming
  • Worm
  • Spyware
  • Rootkit
When malicious code is planted on your computer and alters your browsers ability to find web addresses, it is known as _______.
  • Rootkit
  • Pharming
  • Worm
  • Spyware
_______ is a program that gathers information about your surfing habits without your knowledge.
  • Firewall
  • Worm
  • Spyware
  • Rootkit
CAPTCHA stands for ______.
  • Cookies obtain your personal information by searching your hard drive
  • People pretending to represent official organizations
  • Completely Automated Public Turing Test to Tell Computers and Humans Apart
  • Placing a found virus in a secure area on the hard drive
A ________ is the portion of virus code that is unique to a particular computer virus.
  • Spyware
  • Virus signature
  • Rootkit
  • Pharming
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
  • Placing a found virus in a secure area on the hard drive
  • FBI and National White Collar Crime Center
  • Installing a manufacturers printer driver
  • Use a dictionary to find a lengthy word that is easy to remember
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as _____.
  • Logical port blocking
  • Rootkit
  • Virus signature
  • A firewall
Which of the following classifications of viruses can change its own code to avoid detection?
  • Pharming
  • Polymorphic
  • Cybercrime
  • Theft of services
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0