Questions and CORRECT Answers
Which of the following statements about cookies is NOT true? - CORRECT ANSWER -
Cookies obtain your personal information by searching your hard drive.
____ hackers break into systems for non-malicious reasons such as to test system security
vulnerabilities. - CORRECT ANSWER - white-hat
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ______
- CORRECT ANSWER - launch a denial of service (DoS) attack on your computer
ll of the following activities may infect your computer with a virus EXCEPT ________.
a. sharing flash drives
b. downloading or running an e-mail attachment file
c. installing a manufacturer's printer driver
d. downloading video files from peer-to-peer sites - CORRECT ANSWER - downloading
or running an e-mail attachment file
With regard to computer protection, quarantining is defined as ________.
a. placing a found virus in a secure area on the hard drive
b.deleting an infected file
c.repairing an infected file
, d.updating your antivirus software - CORRECT ANSWER - placing a found virus in a
secure area on the hard drive
FBI-related scams involve ________. - CORRECT ANSWER - people pretending to
represent official organizations such as the Dept. of Homeland Security
Social ________ is any technique that uses social skills to generate human interaction that
entices individuals to reveal sensitive information. - CORRECT ANSWER - engineering
A ________ allows a hacker to gain access to your computer and take almost complete control of
it without your knowledge. - CORRECT ANSWER - rootkit
Which of the following is NOT a virus category?
a. worm
b. logic bomb
c. pharming
d. macro - CORRECT ANSWER - pharming
A ________ is a virus that is triggered on a certain date. - CORRECT ANSWER - time
bomb
A(n) ________ is the portion of virus code that is unique to a particular computer virus. -
CORRECT ANSWER - virus signature
Creating and distributing ________ is one of the most widespread types of cybercrimes. -
CORRECT ANSWER - computer viruses
________ floods a computer with requests until it shuts down and refuses to answer any requests
for information. - CORRECT ANSWER - a DDoS attack