Filters
Question type

Study Flashcards

A denial-of-service attack can be used to deny hackers access to a computer system.

A) True
B) False

Correct Answer

verifed

verified

CAPTCHA is ________.


A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

________ alarm software is an inexpensive theft deterrent for mobile devices.

Correct Answer

verifed

verified

A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

Correct Answer

verifed

verified

encryption...

View Answer

Match each of the following terms to its meaning: I. grey-hat hacker II. black-hat hacker III. cyberloafing IV. social engineering V. white-hat hacker


A) techniques used to manipulate people into performing actions or divulging confidential information
B) an unethical hacker
C) flaunts expertise to the administrator of a system
D) an ethical hacker
E) using an employer's computer for non-work activities

F) A) and C)
G) A) and E)

Correct Answer

verifed

verified

A stealth virus is designed to infect multiple file types to fool the antivirus software.

A) True
B) False

Correct Answer

verifed

verified

During the process of ________, antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

Correct Answer

verifed

verified

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

Correct Answer

verifed

verified

You should use the same password for each system or website you need to access.

A) True
B) False

Correct Answer

verifed

verified

________ is a program that gathers information about your surfing habits without your knowledge.


A) Adware
B) Ghostware
C) Shareware
D) Spyware

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.


A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Viruses, adware and spyware are referred to collectively as ________.


A) bloatware
B) grayware
C) alertware
D) firmware

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Using your computer for non-work activities while you are being paid to work is known as ________.


A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Rules for creating passwords include all of the following EXCEPT ________.


A) keep your password a secret
B) change your password frequently
C) keep a master password that is the same for all of your accounts
D) use letters, numbers, and symbols in your passwords

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

Correct Answer

verifed

verified

incrementa...

View Answer

An encryption virus replicates itself onto a hard drive's master boot record.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ can help block unwanted, unsolicited e-mail.

Correct Answer

verifed

verified

________ is malware that tries to convince you that your computer is infected with a virus.

Correct Answer

verifed

verified

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.


A) phishing
B) pharming
C) pretexting
D) polymorphing

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 75

Related Exams

Show Answer