CIS 111 Chapter 9

100 cards

CIS 111 Chapter 9 in Technology in Action 7th Edition.


 
  
Created Nov 8, 2010
by
cpousima33

 

 
Table View
 
Download
 
Print

Flashcard Set Preview

  Side A   Side B
1
FOr complete protection when backing up your files, you should use a program that creates a_______...
 
image backup
2
A )_______ virus temporarily erases its code from the files where they reside and then hides...
 
stealth
3
A computer virus normally attaches itself to another computer program known as a:
 
trojan horse
4
Assigning IP addresses when users log on to their ISP is known as________.
 
dynamic addressing
5
The most likely method a hacker would use to access a computer is:
 
entering through the internet
6
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password...
 
biometric
7
A _______ is a virus that is triggered when certain conditions are met, such as a file opening...
 
logic bomb
8
Hackers who use their knowledge to break into systems just for the fun of it refer to themselves...
 
white hat
9
THe best defense against viruses is to install________ which is specifically designed to detect...
 
antivirus software
10
_______ is the act of tricking people into revealing sensitive information and is often associated...
 
Phishing
11
The malicious activity perpetrated by a Trojan horse program is often the installation of a...
 
backdoor
12
A ______ is a virus that is attached to documents such as Word or Excel files.
 
macro virus
13
A majority of online credit card fraud results from:
 
phishing
14
Which of the following classifications of viruses can change its own code?
 
polymorphic
15
_______ software can identify and eliminate known viruses effectively.
 
antivirus
16
______ is an unwanted piggyback program that usually downloads with software you are installing...
 
Spyware
17
A ______ virus can change its own code.
 
polymorphic
18
During the process of ______ the antivirus software records key attributes about the files...
 
inoculation
19
Unwanted, unsolicited e-mail is referred to as _______.
 
spam
20
A ________ is the portion of virus code that is unique to a particular computer virus.
 
virus signature
21
_______ makes broadband users more vulnerable to attacks.
 
Static addressing
22
A _______ is a secure internet pathway that large corporations use to protect sensitive data.
 
virtual private network (VPN)
23
_______ viruses compress common data files into a file using a complex key, rendering your...
 
encryption
24
Which of the statements about protecting against power surges is FALSE?
 
printers do not require power surge protection
25
A _______ is a portion of virus code that is unique to a particular computer virus.
 
virus signature
26
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
 
installing an external hard drive
27
Hackers who use their knowledge to destroy information are known as _______ hackers.
 
black hat
28
Configuring a firewall to deny packets sent to specific logical ports is referred to as _______.
 
packet filtering
29
_______ occur when a Web site downloads harmful software onto your computer.
 
Drive-by downloads
30
A person with malicious intent can take complete control of your computer by using a backdoor...
 
TRUE
31
Wireless networks are no more vulnerable to packet than are wired networks.
 
FALSE
32
A _______ is composed of software programs known as robots or bots, which run automatically...
 
botnet
33
The _______ is a program that executes whenever a computer boots up.
 
master boot record
34
_______ encourages internet users to reveal sensitive information that could lead to identity...
 
phishing
35
Many phtoocopiers have hard drives, just as computers do, which makes them a potential target...
 
TRUE
36
A _______ can help block unwanted, unsolicited e-mail.
 
spam filter
37
A _______ backs up only the files on a computer that have changed since the last time a backup...
 
incremental backup
38
Which of the following is formally defined as any criminal action perpetrated primarily though...
 
cybercrime
39
Instant messaging programs are susceptible to virus attacks.
 
TRUE
40
_______ encourages internet users to reveal sensitive information that could lead to identity...
 
Phishing
41
_______ are virtual communication paths that allow a computer to organize requests for information...
 
logical ports
42
You can block logical ports to invaders and make your computer invisible to others on the internet...
 
a firewall
43
_______ is a process used by firewalls to assign internal IP addresses on a network.
 
Network address translation and NAT
44
A _______ is a virus that is triggered when certain conditions are met, such as opening a file...
 
logic bomb
45
A _______ virus temporarily erases its code from the files where it resides and then hides...
 
stealth
46
Which of the following statements about cookies is NOT true?
 
cookies obtain your personal information by searching your hard drive.
47
_______ is doing anything with a computer while you are being paid to do your job.
 
cyberloafing
48
When electrical current is supplied in excess of normal voltage, this results in a _______.
 
power surge
49
A ________ is a program that appears to be something useful or desirable but does something...
 
trojan horse
50
Drive-by downloads occur when:
 
a web site downloads harmful software onto your computer.
51
VPN stands for:
 
Virtual private network
52
_______ floods a computer with requests until it shuts down and refuses to answer any requests...
 
A DDoS atack
53
A _______ virus runs a program that searches for common data files, compresses them, and makes...
 
encryption
54
A _______ works independently of host file execution and is much more active in spreading itself...
 
worm
55
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect...
 
information quality control.
56
Configuring a firewall to ignore all incoming packets that request access to a specific port...
 
logical port blocking
57
A virus's main purpose is to _______ itself and copy its code into as many other files as possible.
 
replicate
58
All of the following can be used for backing up data files EXCEPT:
 
RAM
59
_______ is characterized by someone using your personal information to assume your identity...
 
identity theft
60
The process of inoculation occurs when antivirus software finds an infected file and moves...
 
FALSE
61
A zombie is another person's computer controlled by a hacker.
 
TRUE
62
_______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing...
 
Bluesnarfing
63
A _______ is a secure internet pathway that large corporations use to protect sensitive data.
 
VPN
64
A hoax is referred to as a ________ after it becomes so well known that it is incorporated...
 
urban legend
65
The Windows utility that can automatically install security patches is called _______.
 
update
66
with regard to computer protection, quarantining is defined as:
 
placing a found virus in a secure area on the hard drive
67
_______ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make...
 
bluebugging
68
_______ is an unwanted piggyback program that usually downloads with software you are installing...
 
spyware
69
Code issued by the manufacturer of software programs that repairs known security problems is...
 
software patch and patch
70
The purpose of network address translation (NAT) is to:
 
hide user IP addresses from the internet
71
Using a _______, hackers can access and delete all files on your computer, send e-mail, run...
 
backdoor program
72
_______ occurs when a hacker takes control of a bluetooth-enabled device to make phone calls,...
 
bluebugging
73
Which of these statements about physically protecting your computer is FALSE?
 
Data line surges can be blocked by using a computer surround.
74
A cyberspace _______ is an attempt to make someone believe something that is untrue.
 
hoax
75
For complete protection when backing up your files, you should use a program that creates a...
 
image backup
76
If your IP address is always the same, you have a _______ address.
 
static
77
For security reasons, you should be extremely wary of opening e-mail _______ such as Word files.
 
attachments
78
Most often, hackers initiate a DDoS attack by creating and activating _______ computers.
 
zombie
79
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs,...
 
keystroke loggers
80
_______ is doing anything with a computer while you are being paid to do your job.
 
cyberloafing
81
A _______ is defined as any criminal action perpetrated primarily through the use of a computer.
 
cybercrime
82
A _______ virus is designed to infect multiple file types in an effort to fool antivirus software.
 
multipartite
83
All computers connected to the internet have a unique address referred to as a _______.
 
Internet Protocol (IP) address
84
Which of the following is a program that appears to be something useful or desirable but does...
 
Trojan Horse
85
Many _______ sold for home use are also configured as firewalls and are capable of performing...
 
routers
86
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs,...
 
keystroke loggers
87
Social _______ is any technique that uses social skills to generate human interaction that...
 
engineering
88
A _______ is a computer program that investigates data packets as they travel through the network...
 
packet sniffer
89
Photocopiers do not present any vulnerability for potential hackers.
 
FALSE
90
Young, amateur hackers are often referred to as _______.
 
script kiddies
91
Social _______ is any technique that uses social skills to generate human interaction that...
 
engineering
92
Adware and spyware are referred to collectively as:
 
grayware
93
During the process of _______ the antivirus software records key attributes about the files...
 
encryption
94
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
 
launch a denial of service (DoS) attack on your computer.
95
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password...
 
biometric
96
Which type of virus was the famous Michelangelo virus?
 
a time bomb
97
A virus signature is a portion of virus code that is unique to a particular computer virus.
 
TRUE
98
A _______ virus runs a program that searches for common data files, compresses them, and make...
 
encryption
99
Rules for creating passwords include all of the following EXCEPT:
 
keep your password written down and stored in any easy-to-remember location
100
File Transfer Protocol (FTP) uses port _______.
 
21

No comments yet! Be the first to add a comment below!

Please login to post comments.
After login, we will forward you back to this flashcard.


Upgrade and get a lot more done!
Upgrade    Cancel