Chapter 9 Flashcards

1
Q

A ________ is a secure Internet pathway that large corporations use to protect sensitive data.

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer virus normally attaches itself to another computer program known as a ________.

A

host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of virus was the famous Michelangelo virus?

A

a time bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following classifications of viruses can change its own code to avoid detection?

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ________ works independently of host file execution and is much more active in spreading itself than a virus is.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory.

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With regard to computer protection, quarantining is defined as ________.

A

placing a found virus in a secure area on the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

A

inoculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

A

virus signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Drive-by downloads occur when ________.

A

a Web site downloads harmful software onto your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT

A

launch a denial of service (DoS) attack on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A

a Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A

A DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most likely method a hacker would use to access a computer is ________.

A

entering through its Internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for creating passwords include all of the following EXCEPT

A

keep your password written down and stored in any easy-to-remember location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

A

a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ makes broadband users more vulnerable to attacks.

A

Static addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The purpose of network address translation (NAT) is to ________.

A

hide user IP addresses from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A

logical port blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

A

backdoor program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Adware and spyware are referred to collectively as ________.

A

grayware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

A

keystroke loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following statements about cookies is NOT true?

A

Cookies obtain your personal information by searching your hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

A

biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

All of the following can be used for backing up data files EXCEPT

A

RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

All of the following approaches can be taken to protect your notebook computer from theft EXCEPT

A

installing an external hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A ________ is a virus that is attached to documents such as Word or Excel files.

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

________ is doing non-work-related activities with a computer while you are being paid to do your job.

A

Cyberloafing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.

A

image backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A

engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A cyberspace ________ is an attempt to make someone believe something that is untrue.

A

hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of these statements about physically protecting your computer is FALSE?

A

Power surges can be blocked by using a computer surround.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the statements about protecting against power surges is FALSE?

A

Printers do not require power surge protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A virus signature is a portion of virus code that is unique to a particular computer virus.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Instant messaging programs are susceptible to virus attacks.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Wireless networks are no more vulnerable to packet sniffers than are wired networks.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Many photocopiers have hard drives, just as computers do, which makes them a potential target for identity thieves.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Photocopiers do not present any vulnerability for potential hackers.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A zombie is another person’s computer controlled by a hacker.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A person with malicious intent can take almost complete control of your computer by using a backdoor program.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Hackers most often obtain access to someone’s computer via direct access.

A

FALSE

50
Q

Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing and networking.

A

FALSE

51
Q

Theft of a computer is considered cybercrime.

A

FALSE

52
Q

Creating and spreading online viruses is a cybercrime.

A

TRUE

53
Q

Video files cannot transmit viruses.

A

FALSE

54
Q

A logic bomb is normally triggered by the passage of time or on a certain date.

A

FALSE

55
Q

The master boot record executes every time a computer boots up.

A

TRUE

56
Q

The terms virus and worm actually mean the same thing.

A

FALSE

57
Q

A worm infects a host file and waits for that file to be executed on another computer to replicate.

A

FALSE

58
Q

A macro virus is a virus that is attached to a document such as a Word or Excel file.

A

TRUE

59
Q

Not all scripts are malicious.

A

TRUE

60
Q

A virus signature is a portion of virus code that is unique to a particular computer virus.

A

TRUE

61
Q

Instant messaging programs are susceptible to virus attacks.

A

TRUE

62
Q

Network address translation (NAT) is used to assign internal IP addresses on a network.

A

TRUE

63
Q

A denial of service attack can be used to deny hackers access to a computer system.

A

FALSE

64
Q

When creating a password, it’s best to pick a password that is easy to remember, such as your birth date.

A

FALSE

65
Q

To create a secure password, you should use both uppercase and lowercase letters.

A

TRUE

66
Q

You should use the same password for each system or Web site you need to access.

A

FALSE

67
Q

The Windows operating system has built-in password protection of files as well as the entire desktop.

A

TRUE

68
Q

Bluesnarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an Internet connection

A

FALSE

69
Q

You are more vulnerable to a hacker attack on a Windows system than you are on a Linux system.

A

TRUE

70
Q

An incremental backup backs up the files on a computer that have changed since the last time a backup was performed.

A

TRUE

71
Q

71) A computer virus’s main purpose is to ________ itself and copy its code into as many other files as possible.

A

replicate

72
Q

VPN stands for ________

A

virtual private network

73
Q

Configuring a firewall to deny packets sent to specific logical ports is referred to as logical port blocking or ________.

A

packet filtering

74
Q

All computers connected to the Internet have a unique address referred to as a(n) ________.

A

Internet Protocol address

75
Q

Assigning IP addresses when users log on to their ISP is known as ________.

A

dynamic addressing

76
Q

A(n) ________ is a secure Internet pathway that corporations use to protect sensitive data.

A

VPN

virtual private network

77
Q

A(n) ________ is defined as any criminal action perpetrated primarily through the use of a computer.

A

cybercrime

78
Q

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

A

Phishing

79
Q

The Windows utility that can automatically install security patches is called ________.

A

Windows Update

80
Q

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

A

attachments

81
Q

The ________ is a program that executes whenever a computer boots up.

A

master boot record

82
Q

________ software can identify and eliminate known viruses effectively.

A

Antivirus

83
Q

A(n) ________ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times.

A

logic bomb

84
Q

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

A

encryption

85
Q

Code issued by the manufacturer of software programs that repairs known security problems is referred to as a(n) ________.

A

software patch

86
Q

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

A

multipartite

87
Q

A(n) ________ virus can change its own code.

A

polymorphic

88
Q

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.

A

stealth

89
Q

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.

A

inoculation

90
Q

The best defense against viruses is to install ________, which is specifically designed to detect viruses and protect your computer and files from harm.

A

antivirus software

91
Q

A(n) ________ is a portion of virus code that is unique to a particular computer virus.

A

virus signature

92
Q

________ occur when a Web site downloads harmful software onto your computer.

A

Drive-by downloads

93
Q

Hackers who use their knowledge to destroy information are known as ________ hackers.

A

black-hat

94
Q

Hackers who use their knowledge to break into systems just for the challenge of it refer to themselves as ________ hackers.

A

white-hat

95
Q

Young, amateur hackers are often referred to as ________.

A

script kiddies

96
Q

A(n) ________ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes.

A

packet sniffer

97
Q

________ is characterized by someone using your personal information to assume your identity for the purpose of defrauding others.

A

Identity theft

98
Q

A(n) ________ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge.

A

Trojan horse

99
Q

The malicious activity perpetrated by a Trojan horse program is often the installation of a(n) ________ program.

A

backdoor

100
Q

Most often, hackers initiate a DDoS attack by creating and activating ________ computers.

A

zombie

101
Q

A(n) ________ is composed of software programs known as robots or bots, which run automatically on a large number of zombie computers.

A

botnet

102
Q

________ viruses compress common data files using a complex key, rendering the files unusable.

A

Encryption

103
Q

________ are virtual communication paths that allow a computer to organize requests for information from other networks or computers.

A

Logical ports

104
Q

________ occurs when a hacker takes over a Bluetooth-enabled device so that he or she can make phone calls.

A

Bluebugging

105
Q

________ is an unwanted piggyback program that usually downloads with other software you are installing from the Internet.

A

Spyware

106
Q

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

A

keystroke loggers

107
Q

Unwanted, unsolicited e-mail is referred to as ________.

A

spam

108
Q

A(n) ________ can help block unwanted, unsolicited e-mail.

A

spam filter

109
Q

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

A

biometric

110
Q

________ is doing excessive non-work-related activities with a computer while you are being paid to do your job.

A

Cyberloafing

111
Q

File Transfer Protocol (FTP) uses port number ________.

A

21

112
Q

If your IP address is always the same, you have a(n) ________ address.

A

static

113
Q

________ is a process used by firewalls to assign internal IP addresses on a network.

A

Network address translation

114
Q

_______ involves exploiting a flaw in Bluetooth access software for the purpose of accessing a Bluetooth device and stealing the information contained on it.

A

Bluesnarfing

115
Q

For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.

A

image backup

116
Q

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A

engineering

117
Q

________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.

A

Phishing

118
Q

A hoax is referred to as a(n) ________ after it becomes so well known that it is incorporated into society as if it were true.

A

urban legend

119
Q

A(n) ________ backs up only the files on a computer that have changed since the last time a backup was performed.

A

incremental backup

120
Q

When electrical current is supplied in excess of normal voltage, this results in a(n) ________.

A

power surge