MISY chapter 9 questions with verified solutions 2023/2024
MISY chapter 9All of the following are top cyber crimes reported to the IC3 in 2011, except - correct answer child porn Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer - correct answer cybercrime IC3 is a partnership between - correct answer FBI and National White Collar Crime Center Which type of virus was the famous Michelangelo virus? - correct answer a time bomb FBI related scams involve - correct answer people pretending to represent official organizations A _____ is a virus that is attached to documents such as Word or Excel files. - correct answer macro virus All of the following are considered cybercrimes, EXCEPT - correct answer theft of a cell phone Which of the following classifications of viruses can change its own code to avoid detection? - correct answer Polymorphic Creating and disseminating ________ if one of the most widespread types of cybercrimes. - correct answer computer viruses With regard to computer protection, quarantining is defined as - correct answer placing a found virus in a secure area on the hard drive All of the following are ways that can infect your computer with a virus, EXCEPT - correct answer logging into email A(n) ____ is the portion of virus code that is unique to a particular computer virus - correct answer virus signature One virus called ____ is used to trick users into downloading an infected file to their phone, which steals online banking information. - correct answer Spyeye Mobile Banking A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT - correct answer launch a denial of service (DoS) attack on your computer All of the folioing are categories of viruses, EXCEPT - correct answer snakes You can block logical ports to invaders and make your computer invisible to others on the Internet by installing - correct answer a firewall _____ viruses are often transmitted by a flash drive left in a USB port. - correct answer Boot-sector A ____ is a virus that is triggered on a certain date. - correct answer time bomb _______ floods a computer with requests until it shuts own and refuses to answer any requests for information - correct answer a DDoS attack A(n) ________ takes advantage of file transport methods to spread on their own. - correct answer worm Configuring a firewall to ignore all incoming packets that request access to a specific port is known as - correct answer logical port blocking A virus that changes its own code or periodically rewrites itself to avoid detection. - correct answer polymorphic Rules for creating passwords include all of the following, EXCEPT - correct answer keep your password written down and stored in any easy-to-remember location
Written for
- Institution
- MISY
- Course
- MISY
Document information
- Uploaded on
- November 3, 2023
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal