Deck 9: Securing Your System: Protecting Your Digital Data and Devices
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/135
Play
Full screen (f)
Deck 9: Securing Your System: Protecting Your Digital Data and Devices
1
All of the following activities may infect your computer with a virus except ________.
A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document
A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document
D
2
Government impersonation scams involve ________.
A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods
A
3
Viruses, adware, and spyware are referred to collectively as ________.
A) bloatware
B) grayware
C) alertware
D) firmware
A) bloatware
B) grayware
C) alertware
D) firmware
B
4
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
A) Black-hat
B) Gray-hat
C) White-hat
D) Green-hat
A) Black-hat
B) Gray-hat
C) White-hat
D) Green-hat
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is formally defined as any criminal action perpetrated primarily using a computer?
A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
A) Social networking
B) Cybercrime
C) Phishing
D) Hacking
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
A) worm
B) script virus
C) encryption virus
D) macro virus
A) worm
B) script virus
C) encryption virus
D) macro virus
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
7
A ________ is a virus that is attached to documents.
A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a computer virus category?
A) Worm
B) Logic bomb
C) Macro
D) Pharming
A) Worm
B) Logic bomb
C) Macro
D) Pharming
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
9
________ is a program that gathers information about your surfing habits without your knowledge.
A) Adware
B) Ghostware
C) Shareware
D) Spyware
A) Adware
B) Ghostware
C) Shareware
D) Spyware
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following classifications of viruses can change its own code to avoid detection?
A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
A) Stealth
B) Multipartite
C) Polymorphic
D) Worm
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
11
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
12
A packet analyzer is a program that can enable a hacker to do all of the following except ________.
A) use your debit card information to purchase items illegally
B) gather information to assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
A) use your debit card information to purchase items illegally
B) gather information to assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
13
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense
A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following statements about cookies is not true?
A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
A) Cookies obtain your personal information by searching your hard drive.
B) Cookies are text files.
C) Cookies help companies determine the traffic flow through their website.
D) Some companies sell the personal information found in cookies to other companies.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
15
You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing ________.
A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software
A) a packet sniffer
B) a firewall
C) a packet filter
D) antivirus software
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
16
Which type of virus was the famous Michelangelo virus?
A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
17
Creating and distributing ________ is one of the most widespread types of cybercrimes.
A) spam
B) computer viruses
C) cookies
D) zombies
A) spam
B) computer viruses
C) cookies
D) zombies
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
18
All of the following are top cybercrimes reported to the IC3 except ________.
A) identity theft
B) non-auction scams
C) advance fee fraud
D) malware fraud
A) identity theft
B) non-auction scams
C) advance fee fraud
D) malware fraud
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
19
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
20
A ________ is a virus that is triggered on a certain date.
A) worm
B) macro
C) logic bomb
D) time bomb
A) worm
B) macro
C) logic bomb
D) time bomb
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
21
Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
A) forensics
B) hacking
C) inoculation
D) multi-factor authentication
A) forensics
B) hacking
C) inoculation
D) multi-factor authentication
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
22
Which is not one of the four key pieces of personal information you should protect from identity thieves?
A) Social Security number
B) Anniversary
C) Date of birth
D) Street address
A) Social Security number
B) Anniversary
C) Date of birth
D) Street address
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
23
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
A) phishing
B) pharming
C) pretexting
D) polymorphing
A) phishing
B) pharming
C) pretexting
D) polymorphing
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
A) virus signature
B) encryption code
C) compression code
D) virus pattern
A) virus signature
B) encryption code
C) compression code
D) virus pattern
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
25
Ethical hackers are also known as white-hat hackers.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
26
A whole-house surge protector is installed ________.
A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers
A) at the breaker panel
B) at the power line from the street
C) on each device and appliance
D) on computers
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
27
Using your computer for non-work activities while you are being paid to work is known as ________.
A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
28
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
A) firehouse
B) firebreak
C) firewall
D) fire extinguisher
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
29
Regarding computer protection, quarantining is defined as ________.
A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?
A) multi-partite
B) polymorphic
C) stealth
D) encryption
A) multi-partite
B) polymorphic
C) stealth
D) encryption
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
31
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A) engineering
B) theft
C) pretexting
D) pharming
A) engineering
B) theft
C) pretexting
D) pharming
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
32
Which type of hackers break into systems for the thrill or to show off their skills.
A) Gray-hat
B) White-hat
C) Black-hat
D) Blue-hat
A) Gray-hat
B) White-hat
C) Black-hat
D) Blue-hat
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ________ backup makes a copy of all changes since the last backup.
A) incremental
B) full
C) image
D) data
A) incremental
B) full
C) image
D) data
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
34
Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?
A) Image
B) Full
C) Incremental
D) Complete
A) Image
B) Full
C) Incremental
D) Complete
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
35
Creating and spreading online viruses is a cybercrime.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not an example of a factor used in multi-factor authentication?
A) A captcha
B) A password
C) An ID card
D) A fingerprint
A) A captcha
B) A password
C) An ID card
D) A fingerprint
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
37
A denial-of-service attack can be used to deny hackers access to a computer system.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ____virus replicates itself onto a hard drive's master boot record.
A) boot-sector
B) macro
C) multi-partite
D) encryption
A) boot-sector
B) macro
C) multi-partite
D) encryption
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
39
One type of CAPTCHA is ________.
A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus
A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
40
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
41
A worm does not require human interaction to spread to other computers.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
42
The terms virus and worm mean the same thing.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
43
A stealth virus is designed to infect multiple file types to fool the antivirus software.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
44
A time bomb virus can be triggered on a certain date.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
45
A virus signature is a portion of virus code that is unique to a particular computer virus.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
46
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
47
Data breaches are always intentional.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
48
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
49
Currently, there are no antivirus programs for mobile devices.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
50
Gray-hat hackers are not doing anything illegal.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
51
Full backups back up all your data, but not your applications.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
52
All viruses cause serious destruction of computer data.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
53
Computer forensics is used to collect evidence for use in courtrooms.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
54
You should use the same password for each system or website you need to access.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
55
A full backup and an image backup are the same thing.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
56
Using a backdoor program, you can use your computer while you are away from the office.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
57
An encryption virus replicates itself onto a hard drive's master boot record.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
58
An image backup is the same as a system backup.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
59
Since you can always redownload program files, you do not need to include them in backups.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
60
A macro virus is a virus that is attached to a file.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
61
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
62
Another name for a sniffer is a(n) ________ analyzer.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
63
VPN's allow data to be transmitted on a public network just as securely as on a private network.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) ________ virus is a series of commands that is executed without your knowledge.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
65
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
68
The most common kind of pretexting in cyberspace is ________.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
70
Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
71
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
72
Unwanted, unsolicited e-mail is referred to as ________.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
73
During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
74
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
75
A botnet is a group of applications running on ________ computers in a DDoS attack.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
76
________ is malware that tries to convince you that your computer is infected with a virus.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
77
Victims of ________ can spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
78
Multi-factor authentication requires three of four possible authentication factors.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
79
A(n) ________ can help block unwanted, unsolicited e-mail.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck
80
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
Unlock Deck
Unlock for access to all 135 flashcards in this deck.
Unlock Deck
k this deck