Chapter 9 Practice Multiple Choice Questions
with Detailed Verified Answers
_____ hackers break into systems for non-malicious reasons such as to test system
security vulnerabilities.
Ans: White-hat
Using your computer for non-work activities while you are being paid to work is
known as ______.
Ans: Cyberloafing
A ______ is a virus that is triggered on a certain date.
Ans: Time bomb
You can block logical ports from invaders and make your computer invisible to others
on the Internet by installing ______.
Ans: A firewall
The Internet Crime Complaint Center (IC3) is a partnership between the _______.
Ans: FBI and National White Collar Crime Center
_______ viruses are often transmitted by a flash drive left in a USB port.
Ans: Boot-sector
© Get it right 2025 Getaway - Stuvia US All rights reserved
, Click here for more: Scholars nexus
A packet sniffer is a program that can enable a hacker to do all of the following
EXCEPT _______.
Ans: Launch a denial of service (DoS) attack on your computer
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT
______.
Ans: Theft of services
Creating and distributing ____ is one of the most widespread types of cyber crimes.
Ans: Computer viruses
CAPTCHA stands for ______.
Ans: Completely Automated Public Turing Test to Tell Computers and Humans Apart
A ________ is named after a housing construction feature that slows the spread of
fires from house to house.
Ans: Firewall
Rules for creating passwords include all of the following EXCEPT ______.
Ans: Use a dictionary to find a lengthy word that is easy to remember
_______ is a program that gathers information about your surfing habits without
your knowledge.
Ans: Spyware
Which of the following classifications of viruses can change its own code to avoid
detection?
© Get it right 2025 Getaway - Stuvia US All rights reserved