Chapter 9 Flashcards
A ________ is a secure Internet pathway that large corporations use to protect sensitive data.
VPN
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
A computer virus normally attaches itself to another computer program known as a ________.
host program
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
logic bomb
Which type of virus was the famous Michelangelo virus?
a time bomb
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
worm
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory.
stealth
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
Drive-by downloads occur when ________.
a Web site downloads harmful software onto your computer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
launch a denial of service (DoS) attack on your computer.
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
Rules for creating passwords include all of the following EXCEPT
keep your password written down and stored in any easy-to-remember location.
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
a firewall
________ makes broadband users more vulnerable to attacks.
Static addressing
The purpose of network address translation (NAT) is to ________.
hide user IP addresses from the Internet
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
Bluebugging
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
routers
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
backdoor program
Adware and spyware are referred to collectively as ________.
grayware
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
Spyware
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
All of the following can be used for backing up data files EXCEPT
RAM.
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT
installing an external hard drive.
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
________ is doing non-work-related activities with a computer while you are being paid to do your job.
Cyberloafing
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
image backup
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Phishing
A cyberspace ________ is an attempt to make someone believe something that is untrue.
hoax
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround.
Which of the statements about protecting against power surges is FALSE?
Printers do not require power surge protection.
A virus signature is a portion of virus code that is unique to a particular computer virus.
TRUE
Instant messaging programs are susceptible to virus attacks.
TRUE
The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive.
FALSE
Wireless networks are no more vulnerable to packet sniffers than are wired networks.
FALSE
Many photocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves.
TRUE
Photocopiers do not present any vulnerability for potential hackers.
FALSE
A zombie is another person’s computer controlled by a hacker.
TRUE
A person with malicious intent can take almost complete control of your computer by using a backdoor program.
TRUE