Chapter 9

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
rootkit
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
macrovirus
A ________ is a virus that is triggered on a certain date.
time bomb
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
launch a denial of service (DoS) attack on your computer
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
A(n) ________ takes advantage of file transport methods to spread on its own.
worm
All of the following activities may infect your computer with a virus EXCEPT ________.
installing a manufacturers printer driver
CAPTCHA stands for ________.
completely automated public turing test to tell humans and computers apart
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
Creating and distributing ________ is one of the most widespread types of cybercrimes.
computer viruses
FBI-related scams involve ________.
people pretending to represent official organizations such as the department of homeland security
Rules for creating passwords include all of the following EXCEPT ________.
use a dictionary to find a lengthy word that is easy to remember
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
he Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and National White Collar Crime Center
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
Which of the following is NOT a virus category?
pharming
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
Which of the following statements about cookies is NOT true?
cookies obtain your personal information by searching your hard drive
Which type of virus was the famous Michelangelo virus?
a time bomb
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
a personal firewall
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
a DDoS attack
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
white-hat
________ is a program that gathers information about your surfing habits without your knowledge.
spyware
________ viruses are often transmitted by a flash drive left in a USB port.
boot-sector