Deck 9: Threats to Your Digital Life

ملء الشاشة (f)
exit full mode
سؤال
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
سؤال
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
سؤال
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

A) hacking
B) identity theft
C) perjury
D) creating viruses
سؤال
A(n) ________ is a program that analyzes the contents of data packets on a network.

A) packet sniffer
B) hacker
C) phisher
D) trojan horse
سؤال
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

A) telephone number
B) social security number
C) first name
D) date of birth
سؤال
________ are new browser windows launched by a website.
سؤال
A virus hidden in a website is known as a(n) ________,

A) script
B) Trojan horse
C) macro
D) multipartite virus
سؤال
________ is software that has a malicious intent.
سؤال
Anyone who breaks into a computer system is known as a(n) ________.
سؤال
Which of the following statements is NOT true about identity theft?

A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
سؤال
The most common occurrence of identity compromise is through ________.

A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
سؤال
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
سؤال
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
سؤال
Which of the following are considered slightly different from viruses because they can run without user interaction?

A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
سؤال
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
سؤال
These are all important protective measures for preventing viruses EXCEPT ________.

A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
سؤال
Which of the following virus types changes its own code to avoid detection?

A) Stealth
B) Macro
C) Polymorphic
D) Encryption
سؤال
________ tries to convince you that your computer is infected.
سؤال
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Threats to Your Digital Life
1
Match each of the following terms to its definition:
I. worm
II. Trojan horse
III. multipartite virus
IV. packet sniffer
V. polymorphic virus
A. a program that examines the contents of all network traffic
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. attempts to infect computers through multiple methods
E. appears to be useful but does something malicious in the background
B, E, D, A, C
2
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Scripts
3
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
Pharming
4
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.

A) hacking
B) identity theft
C) perjury
D) creating viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) ________ is a program that analyzes the contents of data packets on a network.

A) packet sniffer
B) hacker
C) phisher
D) trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.

A) telephone number
B) social security number
C) first name
D) date of birth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ are new browser windows launched by a website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
A virus hidden in a website is known as a(n) ________,

A) script
B) Trojan horse
C) macro
D) multipartite virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is software that has a malicious intent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
Anyone who breaks into a computer system is known as a(n) ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following statements is NOT true about identity theft?

A) Thieves can access personal information by stealing wallets and purses.
B) Thieves can trick people to volunteer their personal information.
C) Thieves can install devices on ATMs that record account numbers and passcodes.
D) Thieves can easily defeat 2-factor authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
The most common occurrence of identity compromise is through ________.

A) phishing scams
B) stolen wallets
C) data breaches of a company that stores your information
D) skimming devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
A type of virus that temporarily erases itself from files and stores itself in memory to avoid detection is called a(n) ________ virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following are considered slightly different from viruses because they can run without user interaction?

A) Spam
B) E-mail viruses
C) Worms
D) Keystroke logger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) ________ is a program that appears to be useful or desirable but does something malicious in the background without your knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
These are all important protective measures for preventing viruses EXCEPT ________.

A) installing antivirus software and keeping it up to date
B) avoiding unknown websites
C) not using Wi-Fi hotspots
D) protecting your personal information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following virus types changes its own code to avoid detection?

A) Stealth
B) Macro
C) Polymorphic
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ tries to convince you that your computer is infected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

A) white-hat hacker
B) black-hat hacker
C) gray-hat hacker
D) red-hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.