You can block logical ports from invaders and make your computer virtually invisible to others on the
Internet by installing ________. - Answers A Firewall
A macro virus is a virus that is attached to a file. - Answers True
Which of the following is formally defined as any criminal action perpetrated primarily using a
computer? - Answers Cybercrime
A time bomb virus can be triggered on a certain date. - Answers True
Currently, there are no antivirus programs for mobile devices. - Answers False
Virtual private networks (VPNs) are secure networks that are established without using the public
Internet infrastructure. - Answers False
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers,
and symbols. - Answers True
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own. -
Answers Worm
Data breaches are always intentional. - Answers False
A ________ is a virus that is attached to documents. - Answers Macro Virus
A(n) ________ is the portion of virus code that is unique to a particular computer virus. - Answers Virus
Signature
Ethical hackers are also known as white-hat hackers. - Answers True
A worm does not require human interaction to spread to other computers. - Answers True
Since you can always redownload program files, you do not need to include them in backups. - Answers
False
An image backup is the same as a system backup. - Answers True
Gray-hat hackers are not doing anything illegal. - Answers False
Personal firewalls can close open logical ports and make your computer invisible to other computers on
the Internet. - Answers True
________ hackers break into systems legally for non-malicious reasons such as to test system security
vulnerabilities. - Answers White Hat
, One type of CAPTCHA is ________. - Answers The wavy hard-to-read letter and number sequence that
you type to prove that you are human to a website
Match each of the following terms to its meaning:
A. attempts to travel between systems through network connections to spread an infection
B. program that attaches itself to another program and attempts to spread itself to other computers
through the exchange of files
C. a program that renders your computer files unusable by compressing them
D. virus that changes its own code to avoid detection
E. virus that is triggered when certain conditions are met
1. Computer Virus
2. Worm
3. Polymorphic Virus
4. Logic Bomb
5. Encryption Virus - Answers A-2, B-1, C-5, D-3, E-4
________ floods a computer with requests until it shuts down and refuses to answer any requests for
information. - Answers A DDoS attack
A stealth virus is designed to infect multiple file types to fool the antivirus software. - Answers False
When malicious code is planted on your computer and alters your browser's ability to find web
addresses, it is known as ________. - Answers Pharming
Using a backdoor program, you can use your computer while you are away from the office. - Answers
False
The terms virus and worm mean the same thing. - Answers False
Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus
software that is looking for it? - Answers Multi-Partite
A denial-of-service attack can be used to deny hackers access to a computer system. - Answers False
Real-time processing means that transactions are updated when they occur. - Answers True