Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
  • biometric
  • engineering
  • firewall
  • encryption
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
  • Spyware
  • stealth
  • biometric
  • firewall
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
  • spyware
  • rootkit
  • boot-sector
  • white-hat
A(n) ________ takes advantage of file transport methods to spread on its own.
  • spam filter
  • botnet
  • script
  • worm
a computer's identity on the Internet
  • zombie
  • spam filter
  • grayware
  • IP address
an "ethical" hacker
  • Trojan horse
  • grey-hat hacker
  • virus signature
  • white-hat hacker
hardware or software for protecting computers from hackers
  • FALSE
  • grayware
  • phishing
  • firewall
One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.
  • Incremental partial
  • Spyeye Mobile Banking
  • spear phishing
  • social engineering
program that appears to be something useful or desirable
  • Trojan horse
  • CAPTCHA
  • time bomb
  • computer virus
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
  • stealth
  • script
  • Incremental partial
  • Grey/gray
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
  • Computer viruses
  • computer virus
  • macro virus
  • engineering
A ________ is a virus that is attached to documents such as Word or Excel files.
  • Boot-sector
  • time bomb
  • encryption
  • macro virus
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
  • biometric
  • Grey/gray
  • time bomb
  • botnet
techniques used to manipulate people into performing actions or divulging confidential information
  • Spyeye Mobile Banking
  • Incremental partial
  • Scareware
  • social engineering
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
  • logical port blocking
  • virus signature
  • engineering
  • Incremental partial
programs that run on a large number of zombie computers
  • TRUE
  • botnet
  • rootkit
  • FALSE
A(n) ________ can help block unwanted, unsolicited e-mail.
  • macro virus
  • stealth
  • spam filter
  • time bomb
Currently, there are no antivirus programs for mobile devices.
  • TRUE
  • zombie
  • spyware
  • FALSE
The terms virus and worm actually mean the same thing.
  • FALSE
  • spyware
  • TRUE
  • packet
Another name for bots is ________.
  • web robots
  • IP address
  • packet
  • A time bomb
a computer controlled by a hacker
  • IP address
  • zombie
  • TRUE
  • FALSE
virus that is triggered when a file is opened or program is started a certain number of times
  • Cybercrime
  • logic bomb
  • biometric
  • logical port blocking
flaunts expertise to the administrator of a system
  • surge protector
  • packet filtering
  • grey-hat hacker
  • spam filter
A(n) ________ protects a computer against power surges.
  • script
  • stealth
  • cyberloafing
  • surge protector
attempts to travel between systems through network connections to spread an infection
  • spam
  • script
  • TRUE
  • worm
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
  • pretexting
  • inoculation
  • encryption
  • identity theft
Another name for a sniffer is a(n) ________ analyzer.
  • pharming
  • TRUE
  • FALSE
  • packet
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
  • time bomb
  • firewall
  • White-hat
  • Scareware
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
  • logical port blocking
  • placing a found virus in a secure area on the hard drive
  • keystroke loggers/key loggers
  • installing a manufacturer's printer driver
A(n) ________ virus is a series of commands that is executed without your knowledge.
  • script
  • botnet
  • stealth
  • encryption
an unethical hacker
  • black-hat hacker
  • encryption virus
  • packet filtering
  • Trojan horse
The most financially damaging cybercrime affecting individuals is ________.
  • theft of services
  • encryption virus
  • identity theft
  • time bomb
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
  • cyberloafing
  • spear phishing
  • engineering
  • phishing
method for selectively allowing certain requests to access ports
  • social engineering
  • theft of services
  • packet filtering
  • identity theft
text file for storing personal preferences pertaining to websites
  • zombie
  • cookie
  • phishing
  • FALSE
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
  • script
  • Grey/gray
  • engineering
  • Incremental partial
malware on your computer used to convince you that your computer has a virus
  • pretexting
  • firewall
  • macro virus
  • scareware
creating a scenario that sounds legitimate enough that someone will trust you
  • pretexting
  • cyberloafing
  • scareware
  • TRUE
transmits information about you, such as your Internet-surfing habits
  • spyware
  • firewall
  • worm
  • FALSE
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
  • Incremental partial
  • script
  • encryption
  • Grey/gray
All of the following are ways that can infect your computer with a virus EXCEPT ________.
  • Cookies obtain your personal information by searching your hard drive.
  • Cybercrime
  • social engineering
  • installing a manufacturer's printer driver
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
  • multipartite
  • surge protector
  • spam filter
  • encryption
a program that renders your computer files unusable by compressing them
  • computer virus
  • encryption virus
  • encryption
  • identity theft
The most common kind of pretexting in cyberspace is ________.
  • cyberloafing
  • pharming
  • identity theft
  • phishing
program that generates distorted text and require that it be typed into a box
  • rootkit
  • CAPTCHA
  • scareware
  • encryption virus
A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
  • rootkit
  • script
  • Grey/gray
  • botnet
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
  • Boot-sector
  • macro virus
  • Polymorphic
  • attachments
All of the following activities may infect your computer with a virus EXCEPT ________.
  • cookies obtain your personal information by searching your hard drive
  • placing a found virus in a secure area on the hard drive
  • installing a manufacturers printer driver
  • polymorphic
he Internet Crime Complaint Center (IC3) is a partnership between the ________.
  • use a dictionary to find a lengthy word that is easy to remember
  • FBI and National White Collar Crime Center
  • installing a manufacturers printer driver
  • placing a found virus in a secure area on the hard drive
A ______________ is a program that takes complete control of your computer without your knowledge
  • biometrics
  • rootkit
  • True
  • File History
computer viruses can be spread by
  • Identity theft, advance fee fraud, government impersonation scams
  • malware fraud
  • save your device if a voltage spike is sent through the electrical system
  • -sharing flash drives -downloading a song from peer-to-peer sharing site-downloading and running a file attached to an email.
A surge protector may look like just another power strip but it also can
  • False
  • save your device if a voltage spike is sent through the electrical system
  • Identity theft, advance fee fraud, government impersonation scams
  • biometrics
Viruses that load from USB drives left connected to computers when computers are turned on are known as
  • malware fraud
  • boot-sector viruses
  • biometrics
  • File History
Firewalls use a process of ________________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
  • True
  • network address translation (NAT)
  • inoculation
  • boot-sector viruses
Password strength is solely determined by the lenght of the password
  • True
  • False
Which of the following in NOT a major type of cybercrime reported to the IC3
  • File History
  • boot-sector viruses
  • biometrics
  • malware fraud
Virtual private networks make it just as secure to send information across a public network as it is on a secure private newtwork
  • True
  • False
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
  • boot-sector viruses
  • File History
  • biometrics
  • inoculation
Malicious software (malware) includes the following
  • viruses, spyware, and adware
  • inoculation
  • malware fraud
  • boot-sector viruses
Encrypting data is not an appropriate measure for mobile devices such as smartphones
  • True
  • False
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0