Chapter 9

Which of the following is NOT a major type of cybercrime reported to the
malware fraud
Viruses that compress files and then demand money to restore them are
known as
encryption viruses
Software designed to close logical ports in your computer is known as a(n)
Which tool do hackers use to gain access to and take control of your
backdoor programs
A computer that a hacker has gained control of in order to launch DoS
attacks is known as a __________ computer.
A backup of all the files on your computer, which essentially creates a
“snapshot” of what your computer looks like at that point in time, is known
as a(n)
image backup.
All of the following were top cybercrimes reported to the IC3 in 2013
EXCEPT ________.
theft of services
Which of the following is formally defined as any criminal action perpetrated
primarily through the use of a computer?
The Internet Crime Complaint Center (IC3) is a partnership between the
FBI and National White Collar Crime Center
FBI-related scams involve ________.
people pretending to represent official organizations such as the Dept. of Homeland
Creating and distributing ________ is one of the most widespread types of
computer viruses
Which of the following is NOT a virus category?
All of the following activities may infect your computer with a virus EXCEPT
downloading or running an e-mail attachment file
________ viruses are often transmitted by a flash drive left in a USB port.
Which type of virus was the famous Michelangelo virus?
A time bomb
A ________ is a virus that is triggered on a certain date.
time bomb
A(n) ________ takes advantage of file transport methods to spread on its
A ________ is a virus that is attached to documents such as Word or Excel
macro virus
Which of the following classifications of viruses can change its own code to
avoid detection?
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
A(n) ________ is the portion of virus code that is unique to a particular
computer virus.
virus signature
________ hackers break into systems for non-malicious reasons such as
to test system security vulnerabilities.
A packet sniffer is a program that can enable a hacker to do all of the
following EXCEPT ________
launch a denial of service (DoS) attack on your computer
A ________ allows a hacker to gain access to your computer and take
almost complete control of it without your knowledge
You can block logical ports from invaders and make your computer
invisible to others on the Internet by installing ________.
a personal firewall
________ floods a computer with requests until it shuts down and refuses
to answer any requests for information.
A DDoS attack