Chapter 9 Flashcards
(14 cards)
When a hacker steals personal info with the intent of impersonating another to commit fraud?
Identify theft
Viruses that compress files and then demand money to restore them are known as?
Encryption viruses
Software designed to close logical ports in your computer is known as a
Firewall
Which tool do hackers use to gain access to and take control of your computer?
Backdoor Programs
A computer that a hacker has gained control of in order to launch DoS attacks is known as a (Blank) computer?
Zombie
Password strength is only determined by the length of the password?
False
Hackers that break into systems for non malicious reasons, such as to test security systems, are known as white hat hackers?
True
Programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as?
Scareware
A backup of all files on your computer which is essentially a snapshot of exactly how your computer looks at a particular point in the time is known as a?
Image Backup
Software that transmits information about you, such as your internet surfing habits, back to a third part is known as?
Spyware
Small text files that some websites automatically store on your computer’s hard drive are known as
Cookies
A social engineering technique in which you create a scenario to gain someone’s trust is known as?
Pretexting
Sending e-mails to lure people into revealing personal information is a technique known as phishing?
True
Encrypting data is not a appropriate measure for protecting mobile devices such as tablets?
False