Chapter 9 Flashcards
A ________ is a secure Internet pathway that large corporations use to protect sensitive data.
VPN
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
A computer virus normally attaches itself to another computer program known as a ________.
host program
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
logic bomb
Which type of virus was the famous Michelangelo virus?
a time bomb
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
worm
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory.
stealth
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
Drive-by downloads occur when ________.
a Web site downloads harmful software onto your computer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
launch a denial of service (DoS) attack on your computer.
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
Rules for creating passwords include all of the following EXCEPT
keep your password written down and stored in any easy-to-remember location.
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
a firewall
________ makes broadband users more vulnerable to attacks.
Static addressing
The purpose of network address translation (NAT) is to ________.
hide user IP addresses from the Internet
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
Bluebugging
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
routers
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
backdoor program