Filters
Question type

Study Flashcards

An image backup is the same as a system backup.

Correct Answer

verifed

verified

All of the following pieces of information should be highly guarded while using a public Wi-Fi hotspot, EXCEPT ________.


A) phone number
B) social security number
C) first name
D) date of birth

Correct Answer

verifed

verified

________ kits are software programs that run on servers and search for vulnerabilities of computers that visit the server.

Correct Answer

verifed

verified

A ________ is a virus that is attached to documents.


A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse

Correct Answer

verifed

verified

Using a backdoor program, you can use your computer while you are away from the office.

Correct Answer

verifed

verified

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.


A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit

Correct Answer

verifed

verified

All of the following activities may infect your computer with a virus except ________.


A) sharing flash drives
B) downloading video files from peer-to-peer sites
C) downloading or running an e-mail attachment file
D) printing a document

Correct Answer

verifed

verified

Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?


A) multi-partite
B) polymorphic
C) stealth
D) encryption

Correct Answer

verifed

verified

Match each of the following terms to its meaning:

Premises
social engineering
gray-hat hacker
white-hat hacker
cyberloafing
black-hat hacker
Responses
an ethical hacker
an unethical hacker
techniques used to manipulate people into performing actions or divulging confidential information
using an employer's computer for non-work activities
flaunts expertise to the administrator of a system

Correct Answer

social engineering
gray-hat hacker
white-hat hacker
cyberloafing
black-hat hacker

Match each of the following terms to its meaning:

Premises
encryption virus
polymorphic virus
worm
computer virus
logic bomb
Responses
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
virus that is triggered when certain conditions are met
virus that changes its own code to avoid detection
attempts to travel between systems through network connections to spread an infection
a program that renders your computer files unusable by compressing them

Correct Answer

encryption virus
polymorphic virus
worm
computer virus
logic bomb

A worm does not require human interaction to spread to other computers.

Correct Answer

verifed

verified

Which of the following is formally defined as any criminal action perpetrated primarily using a computer?


A) Social networking
B) Cybercrime
C) Phishing
D) Hacking

Correct Answer

verifed

verified

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

Correct Answer

verifed

verified

A(n) ________ is a program that analyzes the contents of data packets on a network.


A) packet sniffer
B) hacker
C) phisher
D) trojan horse

Correct Answer

verifed

verified

Anyone who breaks into a computer system is known as a(n) ________.

Correct Answer

verifed

verified

Showing 121 - 135 of 135

Related Exams

Show Answer