When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as 1. malware theft.
2. scareware theft.
3. identity theft.
4. impersonation theft.
3. identity theft

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ___________ attack.
1. scareware
2. denial-of-service
3. backdoor
4. stealth
2. denial-of-service

A series of commands that are executed without your knowledge is a typical attribute of a ___________ virus.
1. encryption
2. time bomb
3. boot-sector
4. script
4. script

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as
1. adware
2. spyware.
3. scareware.
4. trackingware.
3. scareware

A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as
1. logic bombing.
2. keystroke logging.
3. spear phishing.
4. pretexting.
3. spear phishing

Firewalls work by closing ____ in your computer
1. backdoors
2. software gaps
3. logical ports
4. logical doors
3. logical ports

________ involve using a physical attribute such as a fingerprint for authentication.
1. Biometrics
2. Backdoors
3. Trojan horses
4. Rootkits
1. Biometrics

A backup of only the files on your computing device that have been created (or changed) since the last backup is known as a(n)
1. total backup.
2. global backup.
3. image backup.
4. incremental backup.
4. incremental backup

Antivirus software looks for _________ to detect viruses in files.
1. virus VPNs.
2. virus bots.
3. virus signatures.
4. virus artifacts.
3. virus signatures

Updating your operating software on a regular basis helps prevent system corruption from ______, which are malicious websites downloading harmful software to your computer.
2. phishing
3. drive-by-downloads
4. pharming
3. drive-by-downloads

Which of the following is NOT a major type of cybercrime reported to the IC3?
1. identity theft
2. malware fraud
3. Government impersonation scams
4. advance fee fraud
2. malware

Viruses that load from USB drives left connected to computers when computers are turned on are known as
1. encryption viruses.
2. script viruses.
3. polymorphic viruses.
4. boot-sector viruses.
4. boot-sector viruses

Software designed to close logical ports in your computer is known as a(n)
1. firewall.
2. packet filter.
3. network address translator.
4. anti-malware blocker.
1. firewall

Which is NOT a tool hackers use to gain access to and take control of your computer?
1. rootkits
2. phishing software
3. Trojan horse
4. backdoor programs
2. phishing software

A computer that a hacker has gained control of in order to launch DoS attacks is known as a ________ computer.
1. breached
2. zombie
3. compromised
4. rootkit
2. zombie

A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n)
1. image backup.
2. total backup.
3. incremental backup.
4. modification backup.
1. image backup

Password strength is solely determined by the length of the password

One of the best and simplest ways to keep hackers out of your computer is to use a firewall.

Sending e-mails to lure people into revealing personal information is a technique known as phishing.

Encrypting data is not an appropriate measure for protecting mobile devices such as smartphones.

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
1. A Trojan horse
2. A DDoS attack
3. A polymorphic virus
4. Pretexting
2. A DDoS attack

A(n) ________ takes advantage of file transport methods to spread on its own.
1. macro virus
2. worm
3. encryption virus
4. script virus
2. worm

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
1. Hacking
2. Social networking
3. Cybercrime
4. Phishing
3. Cybercrime

A ________ is named after a housing construction feature that slows the spread of fires from house to house.
1. firebreak
2. firewall
3. firehouse
4. fire extinguisher
2. firewall

All of the following activities may infect your computer with a virus EXCEPT ________.
1. downloading or running an e-mail attachment file
2. sharing flash drives
3. downloading video files from peer-to-peer sites
4. printing a document
4. printing a document

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
1. pretexting
2. engineering
3. theft
4. pharming
2. engineering

A ________ is a virus that is triggered on a certain date.
1. macro
2. worm
3. logic bomb
4. time bomb
4. time bomb

The Internet Crime Complaint Center (IC3) is a partnership between the ________.
1. FBI and National Defense Department
2. FBI and National White Collar Crime Center
3. National White Collar Crime Center and U.S. Department of Defense
4. FBI and local police departments
2. FBI and National White Collar Crime center

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
1. logic bomb
2. rootkit
3. denial of service (DoS)
4. zombie
2. rootkit

________ viruses are often transmitted by a flash drive left in a USB port.
1. Logic bomb
2. Macro
3. Time bomb
4. Boot-sector
4. Boot-sector

FBI-related scams involve ________.
1. convincing people to send money as a "good faith" gesture
2. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
3. collecting funds and not delivering the goods
4. running auctions that do not exist
2. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
1. steal your logons and passwords for various accounts
2. use your debit card information to purchase items illegally
3. launch a denial of service (DoS) attack on your computer
4. assume your identity
3. launch a denial of service (DoS) attack on your computer

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
1. polymorphing
2. pretexting
3. pharming
4. aphishing
3. pharming

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
1. Black-hat
2. Green-hat
3. Gray-hat
4. White-hat
4. White-hat

CAPTCHA is ________.
1. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
2. antivirus software
3. password method
4. a rootkit virus
1. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

Using your computer for non-work activities while you are being paid to work is known as ________.
1. cyberbreaking
2. cyberlazing
3. cyberloafing
4. cybersleeping

Rules for creating passwords include all of the following EXCEPT ________.
1. keep your password a secret
2. change your password frequently
3. use a dictionary to find a lengthy word that is easy to remember
4. use letters, numbers and symbols in your passwords
3. use a dictionary to find a lengthy word that is easy to remember

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
1. logical port blocking
2. packet filtering
3. static addressing
4. packet switching
1. logical port blocking

_______ is a program that gathers information about your surfing habits without your knowledge. 1. Shareware
2. Ghostware
3. Adware
4. Spywar
4. spyware

Which type of virus was the famous Michelangelo virus?
1. A worm
2. A script virus
3. An e-mail virus
4. A time bomb
4. time bomb