FOr complete protection when backing up your files, you should use a program that creates a_______ of your entire system. |
|
image backup |
| |
A )_______ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory. |
|
stealth |
| |
A computer virus normally attaches itself to another computer program known as a: |
|
trojan horse |
| |
Assigning IP addresses when users log on to their ISP is known as________. |
|
dynamic addressing |
| |
The most likely method a hacker would use to access a computer is: |
|
entering through the internet |
| |
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called______ authentication devices. |
|
biometric |
| |
A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. |
|
logic bomb |
| |
Hackers who use their knowledge to break into systems just for the fun of it refer to themselves as _________ hackers. |
|
white hat |
| |
THe best defense against viruses is to install________ which is specifically designed to detect viruses and protect your computer and files from harm. |
|
antivirus software |
| |
_______ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud. |
|
Phishing |
| |
The malicious activity perpetrated by a Trojan horse program is often the installation of a _______ program. |
|
backdoor |
| |
A ______ is a virus that is attached to documents such as Word or Excel files. |
|
macro virus |
| |
A majority of online credit card fraud results from: |
|
phishing |
| |
Which of the following classifications of viruses can change its own code? |
|
polymorphic |
| |
_______ software can identify and eliminate known viruses effectively. |
|
antivirus |
| |
______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. |
|
Spyware |
| |
A ______ virus can change its own code. |
|
polymorphic |
| |
During the process of ______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. |
|
inoculation |
| |
Unwanted, unsolicited e-mail is referred to as _______. |
|
spam |
| |
A ________ is the portion of virus code that is unique to a particular computer virus. |
|
virus signature |
| |
_______ makes broadband users more vulnerable to attacks. |
|
Static addressing |
| |
A _______ is a secure internet pathway that large corporations use to protect sensitive data. |
|
virtual private network (VPN) |
| |
_______ viruses compress common data files into a file using a complex key, rendering your files unusable. |
|
encryption |
| |
Which of the statements about protecting against power surges is FALSE? |
|
printers do not require power surge protection |
| |
A _______ is a portion of virus code that is unique to a particular computer virus. |
|
virus signature |
| |
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT: |
|
installing an external hard drive |
| |
Hackers who use their knowledge to destroy information are known as _______ hackers. |
|
black hat |
| |
Configuring a firewall to deny packets sent to specific logical ports is referred to as _______. |
|
packet filtering |
| |
_______ occur when a Web site downloads harmful software onto your computer. |
|
Drive-by downloads |
| |
A person with malicious intent can take complete control of your computer by using a backdoor program. |
|
TRUE |
| |
Wireless networks are no more vulnerable to packet than are wired networks. |
|
FALSE |
| |
A _______ is composed of software programs known as robots or bots, which run automatically on zombie computers. |
|
botnet |
| |
The _______ is a program that executes whenever a computer boots up. |
|
master boot record |
| |
_______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. |
|
phishing |
| |
Many phtoocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves. |
|
TRUE |
| |
A _______ can help block unwanted, unsolicited e-mail. |
|
spam filter |
| |
A _______ backs up only the files on a computer that have changed since the last time a backup was performed. |
|
incremental backup |
| |
Which of the following is formally defined as any criminal action perpetrated primarily though the use of a computer? |
|
cybercrime |
| |
Instant messaging programs are susceptible to virus attacks. |
|
TRUE |
| |
_______ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. |
|
Phishing |
| |
_______ are virtual communication paths that allow a computer to organize requests for information from other networks or computers. |
|
logical ports |
| |
You can block logical ports to invaders and make your computer invisible to others on the internet by installing: |
|
a firewall |
| |
_______ is a process used by firewalls to assign internal IP addresses on a network. |
|
Network address translation and NAT |
| |
A _______ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times. |
|
logic bomb |
| |
A _______ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer. |
|
stealth |
| |
Which of the following statements about cookies is NOT true? |
|
cookies obtain your personal information by searching your hard drive. |
| |
_______ is doing anything with a computer while you are being paid to do your job. |
|
cyberloafing |
| |
When electrical current is supplied in excess of normal voltage, this results in a _______. |
|
power surge |
| |
A ________ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge. |
|
trojan horse |
| |
Drive-by downloads occur when: |
|
a web site downloads harmful software onto your computer. |
| |
VPN stands for: |
|
Virtual private network |
| |
_______ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
|
A DDoS atack |
| |
A _______ virus runs a program that searches for common data files, compresses them, and makes them unusable. |
|
encryption |
| |
A _______ works independently of host file execution and is much more active in spreading itself than a virus is. |
|
worm |
| |
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as: |
|
information quality control. |
| |
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as: |
|
logical port blocking |
| |
A virus's main purpose is to _______ itself and copy its code into as many other files as possible. |
|
replicate |
| |
All of the following can be used for backing up data files EXCEPT: |
|
RAM |
| |
_______ is characterized by someone using your personal information to assume your identity for the purpose of defrauding others. |
|
identity theft |
| |
The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. |
|
FALSE |
| |
A zombie is another person's computer controlled by a hacker. |
|
TRUE |
| |
_______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing a bluetooth device and stealing the information contained on it. |
|
Bluesnarfing |
| |
A _______ is a secure internet pathway that large corporations use to protect sensitive data. |
|
VPN |
| |
A hoax is referred to as a ________ after it becomes so well known that it is incorporated into society as if it were true. |
|
urban legend |
| |
The Windows utility that can automatically install security patches is called _______. |
|
update |
| |
with regard to computer protection, quarantining is defined as: |
|
placing a found virus in a secure area on the hard drive |
| |
_______ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make phone calls. |
|
bluebugging |
| |
_______ is an unwanted piggyback program that usually downloads with software you are installing from the internet. |
|
spyware |
| |
Code issued by the manufacturer of software programs that repairs known security problems is referred to as a _______. |
|
software patch and patch |
| |
The purpose of network address translation (NAT) is to: |
|
hide user IP addresses from the internet |
| |
Using a _______, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with you computer. |
|
backdoor program |
| |
_______ occurs when a hacker takes control of a bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more. |
|
bluebugging |
| |
Which of these statements about physically protecting your computer is FALSE? |
|
Data line surges can be blocked by using a computer surround. |
| |
A cyberspace _______ is an attempt to make someone believe something that is untrue. |
|
hoax |
| |
For complete protection when backing up your files, you should use a program that creates a _______ of your entire system. |
|
image backup |
| |
If your IP address is always the same, you have a _______ address. |
|
static |
| |
For security reasons, you should be extremely wary of opening e-mail _______ such as Word files. |
|
attachments |
| |
Most often, hackers initiate a DDoS attack by creating and activating _______ computers. |
|
zombie |
| |
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as: |
|
keystroke loggers |
| |
_______ is doing anything with a computer while you are being paid to do your job. |
|
cyberloafing |
| |
A _______ is defined as any criminal action perpetrated primarily through the use of a computer. |
|
cybercrime |
| |
A _______ virus is designed to infect multiple file types in an effort to fool antivirus software. |
|
multipartite |
| |
All computers connected to the internet have a unique address referred to as a _______. |
|
Internet Protocol (IP) address |
| |
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background. |
|
Trojan Horse |
| |
Many _______ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT). |
|
routers |
| |
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as_____. |
|
keystroke loggers |
| |
Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
|
engineering |
| |
A _______ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes. |
|
packet sniffer |
| |
Photocopiers do not present any vulnerability for potential hackers. |
|
FALSE |
| |
Young, amateur hackers are often referred to as _______. |
|
script kiddies |
| |
Social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
|
engineering |
| |
Adware and spyware are referred to collectively as: |
|
grayware |
| |
During the process of _______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. |
|
encryption |
| |
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: |
|
launch a denial of service (DoS) attack on your computer. |
| |
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called _______. authentication devices. |
|
biometric |
| |
Which type of virus was the famous Michelangelo virus? |
|
a time bomb |
| |
A virus signature is a portion of virus code that is unique to a particular computer virus. |
|
TRUE |
| |
A _______ virus runs a program that searches for common data files, compresses them, and make them unusable. |
|
encryption |
| |
Rules for creating passwords include all of the following EXCEPT: |
|
keep your password written down and stored in any easy-to-remember location |
| |
File Transfer Protocol (FTP) uses port _______. |
|
21 |
| |