Chapter 9 Flashcards

1
Q

When a hacker steals personal info with the intent of impersonating another to commit fraud?

A

Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses that compress files and then demand money to restore them are known as?

A

Encryption viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software designed to close logical ports in your computer is known as a

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tool do hackers use to gain access to and take control of your computer?

A

Backdoor Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer that a hacker has gained control of in order to launch DoS attacks is known as a (Blank) computer?

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password strength is only determined by the length of the password?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hackers that break into systems for non malicious reasons, such as to test security systems, are known as white hat hackers?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as?

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A backup of all files on your computer which is essentially a snapshot of exactly how your computer looks at a particular point in the time is known as a?

A

Image Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that transmits information about you, such as your internet surfing habits, back to a third part is known as?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Small text files that some websites automatically store on your computer’s hard drive are known as

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A social engineering technique in which you create a scenario to gain someone’s trust is known as?

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sending e-mails to lure people into revealing personal information is a technique known as phishing?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encrypting data is not a appropriate measure for protecting mobile devices such as tablets?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly