Filters
Question type

Study Flashcards

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

Correct Answer

verifed

verified

A(n) ________ virus is a series of commands that is executed without your knowledge.

Correct Answer

verifed

verified

Which of the following is NOT a virus category?


A) Worm
B) Logic bomb
C) Macro
D) Pharming

Correct Answer

verifed

verified

Ethical hackers are also known as white-hat hackers.

Correct Answer

verifed

verified

A ________ is a virus that is attached to documents such as Word or Excel files.


A) script virus
B) macro virus
C) polymorphic virus
D) Trojan horse

Correct Answer

verifed

verified

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.


A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit

Correct Answer

verifed

verified

A ________ is a virus that is triggered on a certain date.


A) worm
B) macro
C) logic bomb
D) time bomb

Correct Answer

verifed

verified

________ occur when a website downloads harmful software onto your computer.

Correct Answer

verifed

verified

The most common kind of pretexting in cyberspace is ________.

Correct Answer

verifed

verified

A virus signature is a portion of virus code that is unique to a particular computer virus.

Correct Answer

verifed

verified

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

Correct Answer

verifed

verified

The Internet Crime Complaint Center (IC3) is a partnership between the ________.


A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense

Correct Answer

verifed

verified

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.


A) A Trojan horse
B) A polymorphic virus
C) A DDoS attack
D) Pretexting

Correct Answer

verifed

verified

One way to protect your personal information on Facebook is to change your ________ settings.

Correct Answer

verifed

verified

Government impersonation scams involve ________.


A) people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B) running auctions that do not exist
C) convincing people to send money as a "good faith" gesture
D) collecting funds and not delivering the goods

Correct Answer

verifed

verified

Showing 61 - 75 of 75

Related Exams

Show Answer