Filters
Question type

Study Flashcards

A good way to keep hackers out of a computer is to install a(n) ________.

Correct Answer

verifed

verified

Currently, there are no antivirus programs for mobile devices.

Correct Answer

verifed

verified

A(n) ____virus replicates itself onto a hard drive's master boot record.


A) boot-sector
B) macro
C) multi-partite
D) encryption

Correct Answer

verifed

verified

Which type of hackers break into systems for the thrill or to show off their skills.


A) Gray-hat
B) White-hat
C) Black-hat
D) Blue-hat

Correct Answer

verifed

verified

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Correct Answer

verifed

verified

Which is not one of the four key pieces of personal information you should protect from identity thieves?


A) Social Security number
B) Anniversary
C) Date of birth
D) Street address

Correct Answer

verifed

verified

A denial-of-service attack can be used to deny hackers access to a computer system.

Correct Answer

verifed

verified

Which of the following virus types changes its own code to avoid detection?


A) Stealth
B) Macro
C) Polymorphic
D) Encryption

Correct Answer

verifed

verified

Computer forensics is used to collect evidence for use in courtrooms.

Correct Answer

verifed

verified

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

Correct Answer

verifed

verified

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.


A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting

Correct Answer

verifed

verified

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

Correct Answer

verifed

verified

The most common kind of pretexting in cyberspace is ________.

Correct Answer

verifed

verified

You should use the same password for each system or website you need to access.

Correct Answer

verifed

verified

________ tries to convince you that your computer is infected.

Correct Answer

verifed

verified

Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?


A) Image
B) Full
C) Incremental
D) Complete

Correct Answer

verifed

verified

Data breaches are always intentional.

Correct Answer

verifed

verified

A virus signature is a portion of virus code that is unique to a particular computer virus.

Correct Answer

verifed

verified

________ alarm software is an inexpensive theft deterrent for mobile devices.

Correct Answer

verifed

verified

All of the following are top cybercrimes reported to the IC3 except ________.


A) identity theft
B) non-auction scams
C) advance fee fraud
D) malware fraud

Correct Answer

verifed

verified

Showing 21 - 40 of 135

Related Exams

Show Answer