Chapter 9 Flashcards

1
Q

A ________ is a secure Internet pathway that large corporations use to protect sensitive data.

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer virus normally attaches itself to another computer program known as a ________.

A

host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of virus was the famous Michelangelo virus?

A

a time bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following classifications of viruses can change its own code to avoid detection?

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ________ works independently of host file execution and is much more active in spreading itself than a virus is.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory.

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With regard to computer protection, quarantining is defined as ________.

A

placing a found virus in a secure area on the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

A

inoculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

A

virus signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Drive-by downloads occur when ________.

A

a Web site downloads harmful software onto your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT

A

launch a denial of service (DoS) attack on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A

a Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A

A DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most likely method a hacker would use to access a computer is ________.

A

entering through its Internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for creating passwords include all of the following EXCEPT

A

keep your password written down and stored in any easy-to-remember location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

A

a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ makes broadband users more vulnerable to attacks.

A

Static addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The purpose of network address translation (NAT) is to ________.

A

hide user IP addresses from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A

logical port blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

A

backdoor program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Adware and spyware are referred to collectively as ________.
grayware
26
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
Spyware
27
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers
28
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
29
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
30
All of the following can be used for backing up data files EXCEPT
RAM.
31
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT
installing an external hard drive.
32
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
33
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
34
________ is doing non-work-related activities with a computer while you are being paid to do your job.
Cyberloafing
35
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
image backup
36
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
37
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Phishing
38
A cyberspace ________ is an attempt to make someone believe something that is untrue.
hoax
39
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround.
40
Which of the statements about protecting against power surges is FALSE?
Printers do not require power surge protection.
41
A virus signature is a portion of virus code that is unique to a particular computer virus.
TRUE
42
Instant messaging programs are susceptible to virus attacks.
TRUE
43
The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive.
FALSE
44
Wireless networks are no more vulnerable to packet sniffers than are wired networks.
FALSE
45
Many photocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves.
TRUE
46
Photocopiers do not present any vulnerability for potential hackers.
FALSE
47
A zombie is another person's computer controlled by a hacker.
TRUE
48
A person with malicious intent can take almost complete control of your computer by using a backdoor program.
TRUE
49
Hackers most often obtain access to someone's computer via direct access.
FALSE
50
Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing and networking.
FALSE
51
Theft of a computer is considered cybercrime.
FALSE
52
Creating and spreading online viruses is a cybercrime.
TRUE
53
Video files cannot transmit viruses.
FALSE
54
A logic bomb is normally triggered by the passage of time or on a certain date.
FALSE
55
The master boot record executes every time a computer boots up.
TRUE
56
The terms virus and worm actually mean the same thing.
FALSE
57
A worm infects a host file and waits for that file to be executed on another computer to replicate.
FALSE
58
A macro virus is a virus that is attached to a document such as a Word or Excel file.
TRUE
59
Not all scripts are malicious.
TRUE
60
A virus signature is a portion of virus code that is unique to a particular computer virus.
TRUE
61
Instant messaging programs are susceptible to virus attacks.
TRUE
62
Network address translation (NAT) is used to assign internal IP addresses on a network.
TRUE
63
A denial of service attack can be used to deny hackers access to a computer system.
FALSE
64
When creating a password, it's best to pick a password that is easy to remember, such as your birth date.
FALSE
65
To create a secure password, you should use both uppercase and lowercase letters.
TRUE
66
You should use the same password for each system or Web site you need to access.
FALSE
67
The Windows operating system has built-in password protection of files as well as the entire desktop.
TRUE
68
Bluesnarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an Internet connection
FALSE
69
You are more vulnerable to a hacker attack on a Windows system than you are on a Linux system.
TRUE
70
An incremental backup backs up the files on a computer that have changed since the last time a backup was performed.
TRUE
71
71) A computer virus's main purpose is to ________ itself and copy its code into as many other files as possible.
replicate
72
VPN stands for ________
virtual private network
73
Configuring a firewall to deny packets sent to specific logical ports is referred to as logical port blocking or ________.
packet filtering
74
All computers connected to the Internet have a unique address referred to as a(n) ________.
Internet Protocol address
75
Assigning IP addresses when users log on to their ISP is known as ________.
dynamic addressing
76
A(n) ________ is a secure Internet pathway that corporations use to protect sensitive data.
VPN | virtual private network
77
A(n) ________ is defined as any criminal action perpetrated primarily through the use of a computer.
cybercrime
78
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Phishing
79
The Windows utility that can automatically install security patches is called ________.
Windows Update
80
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
attachments
81
The ________ is a program that executes whenever a computer boots up.
master boot record
82
________ software can identify and eliminate known viruses effectively.
Antivirus
83
A(n) ________ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times.
logic bomb
84
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
85
Code issued by the manufacturer of software programs that repairs known security problems is referred to as a(n) ________.
software patch
86
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
multipartite
87
A(n) ________ virus can change its own code.
polymorphic
88
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.
stealth
89
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.
inoculation
90
The best defense against viruses is to install ________, which is specifically designed to detect viruses and protect your computer and files from harm.
antivirus software
91
A(n) ________ is a portion of virus code that is unique to a particular computer virus.
virus signature
92
________ occur when a Web site downloads harmful software onto your computer.
Drive-by downloads
93
Hackers who use their knowledge to destroy information are known as ________ hackers.
black-hat
94
Hackers who use their knowledge to break into systems just for the challenge of it refer to themselves as ________ hackers.
white-hat
95
Young, amateur hackers are often referred to as ________.
script kiddies
96
A(n) ________ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes.
packet sniffer
97
________ is characterized by someone using your personal information to assume your identity for the purpose of defrauding others.
Identity theft
98
A(n) ________ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge.
Trojan horse
99
The malicious activity perpetrated by a Trojan horse program is often the installation of a(n) ________ program.
backdoor
100
Most often, hackers initiate a DDoS attack by creating and activating ________ computers.
zombie
101
A(n) ________ is composed of software programs known as robots or bots, which run automatically on a large number of zombie computers.
botnet
102
________ viruses compress common data files using a complex key, rendering the files unusable.
Encryption
103
________ are virtual communication paths that allow a computer to organize requests for information from other networks or computers.
Logical ports
104
________ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make phone calls.
Bluebugging
105
________ is an unwanted piggyback program that usually downloads with other software you are installing from the Internet.
Spyware
106
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers
107
Unwanted, unsolicited e-mail is referred to as ________.
spam
108
A(n) ________ can help block unwanted, unsolicited e-mail.
spam filter
109
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
110
________ is doing excessive non-work-related activities with a computer while you are being paid to do your job.
Cyberloafing
111
File Transfer Protocol (FTP) uses port number ________.
21
112
If your IP address is always the same, you have a(n) ________ address.
static
113
________ is a process used by firewalls to assign internal IP addresses on a network.
Network address translation
114
_______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing a Bluetooth device and stealing the information contained on it.
Bluesnarfing
115
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
image backup
116
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
117
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Phishing
118
A hoax is referred to as a(n) ________ after it becomes so well known that it is incorporated into society as if it were true.
urban legend
119
A(n) ________ backs up only the files on a computer that have changed since the last time a backup was performed.
incremental backup
120
When electrical current is supplied in excess of normal voltage, this results in a(n) ________.
power surge