MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Chapter 9 Quiz
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Report Question
0%
biometric
0%
engineering
0%
firewall
0%
encryption
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
Report Question
0%
Spyware
0%
stealth
0%
biometric
0%
firewall
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
Report Question
0%
spyware
0%
rootkit
0%
boot-sector
0%
white-hat
A(n) ________ takes advantage of file transport methods to spread on its own.
Report Question
0%
spam filter
0%
botnet
0%
script
0%
worm
a computer's identity on the Internet
Report Question
0%
zombie
0%
spam filter
0%
grayware
0%
IP address
an "ethical" hacker
Report Question
0%
Trojan horse
0%
grey-hat hacker
0%
virus signature
0%
white-hat hacker
hardware or software for protecting computers from hackers
Report Question
0%
FALSE
0%
grayware
0%
phishing
0%
firewall
One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.
Report Question
0%
Incremental partial
0%
Spyeye Mobile Banking
0%
spear phishing
0%
social engineering
program that appears to be something useful or desirable
Report Question
0%
Trojan horse
0%
CAPTCHA
0%
time bomb
0%
computer virus
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
Report Question
0%
stealth
0%
script
0%
Incremental partial
0%
Grey/gray
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
Report Question
0%
Computer viruses
0%
computer virus
0%
macro virus
0%
engineering
A ________ is a virus that is attached to documents such as Word or Excel files.
Report Question
0%
Boot-sector
0%
time bomb
0%
encryption
0%
macro virus
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
Report Question
0%
biometric
0%
Grey/gray
0%
time bomb
0%
botnet
techniques used to manipulate people into performing actions or divulging confidential information
Report Question
0%
Spyeye Mobile Banking
0%
Incremental partial
0%
Scareware
0%
social engineering
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Report Question
0%
logical port blocking
0%
virus signature
0%
engineering
0%
Incremental partial
programs that run on a large number of zombie computers
Report Question
0%
TRUE
0%
botnet
0%
rootkit
0%
FALSE
A(n) ________ can help block unwanted, unsolicited e-mail.
Report Question
0%
macro virus
0%
stealth
0%
spam filter
0%
time bomb
Currently, there are no antivirus programs for mobile devices.
Report Question
0%
TRUE
0%
zombie
0%
spyware
0%
FALSE
The terms virus and worm actually mean the same thing.
Report Question
0%
FALSE
0%
spyware
0%
TRUE
0%
packet
Another name for bots is ________.
Report Question
0%
web robots
0%
IP address
0%
packet
0%
A time bomb
a computer controlled by a hacker
Report Question
0%
IP address
0%
zombie
0%
TRUE
0%
FALSE
virus that is triggered when a file is opened or program is started a certain number of times
Report Question
0%
Cybercrime
0%
logic bomb
0%
biometric
0%
logical port blocking
flaunts expertise to the administrator of a system
Report Question
0%
surge protector
0%
packet filtering
0%
grey-hat hacker
0%
spam filter
A(n) ________ protects a computer against power surges.
Report Question
0%
script
0%
stealth
0%
cyberloafing
0%
surge protector
attempts to travel between systems through network connections to spread an infection
Report Question
0%
spam
0%
script
0%
TRUE
0%
worm
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Report Question
0%
pretexting
0%
inoculation
0%
encryption
0%
identity theft
Another name for a sniffer is a(n) ________ analyzer.
Report Question
0%
pharming
0%
TRUE
0%
FALSE
0%
packet
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
Report Question
0%
time bomb
0%
firewall
0%
White-hat
0%
Scareware
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
Report Question
0%
logical port blocking
0%
placing a found virus in a secure area on the hard drive
0%
keystroke loggers/key loggers
0%
installing a manufacturer's printer driver
A(n) ________ virus is a series of commands that is executed without your knowledge.
Report Question
0%
script
0%
botnet
0%
stealth
0%
encryption
an unethical hacker
Report Question
0%
black-hat hacker
0%
encryption virus
0%
packet filtering
0%
Trojan horse
The most financially damaging cybercrime affecting individuals is ________.
Report Question
0%
theft of services
0%
encryption virus
0%
identity theft
0%
time bomb
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
Report Question
0%
cyberloafing
0%
spear phishing
0%
engineering
0%
phishing
method for selectively allowing certain requests to access ports
Report Question
0%
social engineering
0%
theft of services
0%
packet filtering
0%
identity theft
text file for storing personal preferences pertaining to websites
Report Question
0%
zombie
0%
cookie
0%
phishing
0%
FALSE
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
Report Question
0%
script
0%
Grey/gray
0%
engineering
0%
Incremental partial
malware on your computer used to convince you that your computer has a virus
Report Question
0%
pretexting
0%
firewall
0%
macro virus
0%
scareware
creating a scenario that sounds legitimate enough that someone will trust you
Report Question
0%
pretexting
0%
cyberloafing
0%
scareware
0%
TRUE
transmits information about you, such as your Internet-surfing habits
Report Question
0%
spyware
0%
firewall
0%
worm
0%
FALSE
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
Report Question
0%
Incremental partial
0%
script
0%
encryption
0%
Grey/gray
All of the following are ways that can infect your computer with a virus EXCEPT ________.
Report Question
0%
Cookies obtain your personal information by searching your hard drive.
0%
Cybercrime
0%
social engineering
0%
installing a manufacturer's printer driver
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
Report Question
0%
multipartite
0%
surge protector
0%
spam filter
0%
encryption
a program that renders your computer files unusable by compressing them
Report Question
0%
computer virus
0%
encryption virus
0%
encryption
0%
identity theft
The most common kind of pretexting in cyberspace is ________.
Report Question
0%
cyberloafing
0%
pharming
0%
identity theft
0%
phishing
program that generates distorted text and require that it be typed into a box
Report Question
0%
rootkit
0%
CAPTCHA
0%
scareware
0%
encryption virus
A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
Report Question
0%
rootkit
0%
script
0%
Grey/gray
0%
botnet
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
Report Question
0%
Boot-sector
0%
macro virus
0%
Polymorphic
0%
attachments
All of the following activities may infect your computer with a virus EXCEPT ________.
Report Question
0%
cookies obtain your personal information by searching your hard drive
0%
placing a found virus in a secure area on the hard drive
0%
installing a manufacturers printer driver
0%
polymorphic
he Internet Crime Complaint Center (IC3) is a partnership between the ________.
Report Question
0%
use a dictionary to find a lengthy word that is easy to remember
0%
FBI and National White Collar Crime Center
0%
installing a manufacturers printer driver
0%
placing a found virus in a secure area on the hard drive
A ______________ is a program that takes complete control of your computer without your knowledge
Report Question
0%
biometrics
0%
rootkit
0%
True
0%
File History
computer viruses can be spread by
Report Question
0%
Identity theft, advance fee fraud, government impersonation scams
0%
malware fraud
0%
save your device if a voltage spike is sent through the electrical system
0%
-sharing flash drives -downloading a song from peer-to-peer sharing site-downloading and running a file attached to an email.
A surge protector may look like just another power strip but it also can
Report Question
0%
False
0%
save your device if a voltage spike is sent through the electrical system
0%
Identity theft, advance fee fraud, government impersonation scams
0%
biometrics
Viruses that load from USB drives left connected to computers when computers are turned on are known as
Report Question
0%
malware fraud
0%
boot-sector viruses
0%
biometrics
0%
File History
Firewalls use a process of ________________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
Report Question
0%
True
0%
network address translation (NAT)
0%
inoculation
0%
boot-sector viruses
Password strength is solely determined by the lenght of the password
Report Question
0%
True
0%
False
Which of the following in NOT a major type of cybercrime reported to the IC3
Report Question
0%
File History
0%
boot-sector viruses
0%
biometrics
0%
malware fraud
Virtual private networks make it just as secure to send information across a public network as it is on a secure private newtwork
Report Question
0%
True
0%
False
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
Report Question
0%
boot-sector viruses
0%
File History
0%
biometrics
0%
inoculation
Malicious software (malware) includes the following
Report Question
0%
viruses, spyware, and adware
0%
inoculation
0%
malware fraud
0%
boot-sector viruses
Encrypting data is not an appropriate measure for mobile devices such as smartphones
Report Question
0%
True
0%
False
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page