Answers Rated A+
_____ hackers break into systems for non- widespread types of cyber crimes. -
malicious reasons such as to test system ANSWER -Computer viruses
security vulnerabilities. - ANSWER -White-
hat
CAPTCHA stands for ______. - ANSWER -
Completely Automated Public Turing Test to Tell
Using your computer for non-work activities while Computers and Humans Apart
you are being paid to work is known as ______. -
ANSWER -Cyberloafing
A ________ is named after a housing
construction feature that slows the spread of fires
A ______ is a virus that is triggered on a certain from house to house. - ANSWER -Firewall
date. - ANSWER -Time bomb
Rules for creating passwords include all of the
You can block logical ports from invaders and following EXCEPT ______. - ANSWER -
make your computer invisible to others on the Use a dictionary to find a lengthy word that is
Internet by installing ______. - ANSWER -A easy to remember
firewall
_______ is a program that gathers information
The Internet Crime Complaint Center (IC3) is a about your surfing habits without your knowledge.
partnership between the _______. - - ANSWER -Spyware
ANSWER -FBI and National White Collar
Crime Center
Which of the following classifications of viruses
can change its own code to avoid detection? -
_______ viruses are often transmitted by a flash ANSWER -Polymorphic
drive left in a USB port. - ANSWER -Boot-
sector
Which of the following is formally defined as any
criminal action perpetrated primarily through the
A packet sniffer is a program that can enable a use of a computer? - ANSWER -
hacker to do all of the following EXCEPT Cybercrime
_______. - ANSWER -Launch a denial of
service (DoS) attack on your computer
A ______ takes advantage of file transport
methods to spread on its own. - ANSWER -
All of the following were top cybercrimes reported Worm
to the IC3 in 2012 EXCEPT ______. -
ANSWER -Theft of services
Which of the following is NOT a virus category? -
ANSWER -Pharming
Creating and distributing ____ is one of the most
1/2