Technology In Action Chapter 9 Flashcards

(37 cards)

1
Q

Creating and distributing is - –

A

Computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of hackers –

A

Gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A backup

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cookie is not true

A

Cookies obtain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four key pieces

A

Anniversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legally non-malicious

A

White - hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multifactor authentication

A

A captcha

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Not top cybercrimes

A

Malware fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whole surge protector

A

At the breaker panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer with a virus

A

Printing a document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Michelangelo virus?

A

A time bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Floods a computer

A

ADDo’s attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Takes advantage of file

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allows a hacker to gain access

A

Root kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Classifications of viruses

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can block logical ports

17
Q

Virus replicates itself

18
Q

Involves identifying

19
Q

Viruses is designed to infect

20
Q

A packet analyzer

A

Launch a denial

21
Q

Viruses, adware and spyware

22
Q

When malicious code is planted

23
Q

Configuring a firewall

A

Logical port blocking

24
Q

Is a virus triggered

25
Is named after a housing construction
' Firewall
26
The portion of C virus ode
Virus signature
27
Using your computer for non-work activities
Cyberloafing
28
Which time of backup
Image
29
Regarding computer protection
Placing a found virus
30
A program that gathers information
Spy ware
31
The internet crime complaint center (ic3) is a
FBI and National white collar crime Center
32
Government impersonation scams involve
People pretending to represent official
33
A virus that is attached to documents
Macro virus
34
One type of captcha is
The wavy hard letter -
35
Which of the following is formally described as
Cybercrime
36
Any technique
Engineering
37
Not a computer virus category
Charming