Filters
Question type

Study Flashcards

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


A) engineering
B) theft
C) pretexting
D) pharming

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.

Correct Answer

verifed

verified

A whole-house surge protector is installed ________.


A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Creating and spreading online viruses is a cybercrime.

A) True
B) False

Correct Answer

verifed

verified

Gray-hat hackers are not doing anything illegal.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

Correct Answer

verifed

verified

The terms virus and worm mean the same thing.

A) True
B) False

Correct Answer

verifed

verified

A macro virus is a virus that is attached to a file.

A) True
B) False

Correct Answer

verifed

verified

The Internet Crime Complaint Center (IC3) is a partnership between the ________.


A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

Correct Answer

verifed

verified

________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.

Correct Answer

verifed

verified

Using a ____program, hackers can access and delete all the files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

Correct Answer

verifed

verified

Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.


A) hacking
B) identity theft
C) perjury
D) creating viruses

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
zombie
spyware
scareware
spear phishing
rootkit
Responses
transmits information about you, such as your Internet-surfing habits
malware on your computer used to convince you that your computer has a virus
a computer controlled by a hacker
program that allows hackers to gain access to your computer without your knowledge
sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data

Correct Answer

zombie
spyware
scareware
spear phishing
rootkit

A firewall designed specifically for home networks is called a ________ firewall.

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
virus
botnet
hacker
packet
firewall
Responses
a person who poses a threat to your computer
prevents intrusion into your computer
small piece of data that travels through the Internet
group of software programs that usually run independently on a large number of zombie computers
a small program that can compromise a computer system

Correct Answer

virus
botnet
hacker
packet
firewall

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.

Correct Answer

verifed

verified

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.

Correct Answer

verifed

verified

________ is malware that tries to convince you that your computer is infected with a virus.

Correct Answer

verifed

verified

A(n) ________ is the portion of virus code that is unique to a particular computer virus.


A) virus signature
B) encryption code
C) compression code
D) virus pattern

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 135

Related Exams

Show Answer