flashcards_97733.txt

5 Pages
167 Views
Unlock Document

Department
Business Technology Management
Course
BTM 481
Professor
Raul Valverde
Semester
Winter

Description
▯FOr complete protection when backing up your files, you should use a program that creates a_______ of your entire system.€▯▯▯▯▯▯€image backup A )_______ virus temporarily erases its code from the files where they reside an d then hides in the computer's active memory.€▯▯▯▯▯▯€stealth A computer virus normally attaches itself to another computer program known as a :€▯▯▯▯▯▯€trojan horse Assigning IP addresses when users log on to their ISP is known as________.€▯▯▯▯▯▯€dy namic addressing The most likely method a hacker would use to access a computer is:€▯▯▯▯▯▯€entering t hrough the internet Devices that use a unique personal characteristic, such as a fingerprint, in pla ce of a password are called______ authentication devices.€▯▯▯▯▯▯€biometric A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.€▯▯▯▯▯▯€logic bomb Hackers who use their knowledge to break into systems just for the fun of it ref er to themselves as _________ hackers.€▯▯▯▯▯▯€white hat THe best defense against viruses is to install________ which is specifically des igned to detect viruses and protect your computer and files from harm.€▯▯▯▯▯▯€antivi rus software _______ is the act of tricking people into revealing sensitive information and i s often associated with credit card fraud.€▯▯▯▯▯▯€Phishing The malicious activity perpetrated by a Trojan horse program is often the instal lation of a _______ program.€▯▯▯▯▯▯€backdoor A ______ is a virus that is attached to documents such as Word or Excel files.€▯▯▯ ▯▯▯€macro virus A majority of online credit card fraud results from:€▯▯▯▯▯▯€phishing Which of the following classifications of viruses can change its own code?€▯▯▯▯▯▯€po lymorphic _______ software can identify and eliminate known viruses effectively.€▯▯▯▯▯▯€antivi rus ______ is an unwanted piggyback program that usually downloads with software you are installing from the internet.€▯▯▯▯▯▯€Spyware A ______ virus can change its own code.€▯▯▯▯▯▯€polymorphic During the process of ______ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your h ard drive.€▯▯▯▯▯▯€inoculation Unwanted, unsolicited e▯mail is referred to as _______.€▯▯▯▯▯▯€spam A ________ is the portion of virus code that is unique to a particular computer virus.€▯▯▯▯▯▯€virus signature _______ makes broadband users more vulnerable to attacks.€▯▯▯▯▯▯€Static addressing A _______ is a secure internet pathway that large corporations use to protect se nsitive data.€▯▯▯▯▯▯€virtual private network (VPN) _______ viruses compress common data files into a file using a complex key, rend ering your files unusable.€▯▯▯▯▯▯€encryption Which of the statements about protecting against power surges is FALSE?€▯▯▯▯▯▯€print ers do not require power surge protection A _______ is a portion of virus code that is unique to a particular computer vir us.€▯▯▯▯▯▯€virus signature All of the following approaches can be taken to protect your notebook computer f rom theft EXCEPT:€▯▯▯▯▯▯€installing an external hard drive Hackers who use their knowledge to destroy information are known as _______ hack ers.€▯▯▯▯▯▯€black hat Configuring a firewall to deny packets sent to specific logical ports is referre d to as _______.€▯▯▯▯▯▯€packet filtering _______ occur when a Web site downloads harmful software onto your computer.€▯▯▯▯▯ ▯€Drive▯by downloads A person with malicious intent can take complete control of your computer by usi ng a backdoor program.€▯▯▯▯▯▯€TRUE Wireless networks are no more vulnerable to packet than are wired networks.€▯▯▯▯▯▯€F ALSE A _______ is composed of software programs known as robots or bots, which run au tomatically on zombie computers.€▯▯▯▯▯▯€botnet The _______ is a program that executes whenever a computer boots up.€▯▯▯▯▯▯€master b oot record _______ encourages internet users to reveal sensitive information that could lea d to identity theft by sending e▯mails that look like they are from legitimate c ompanies but are, in fact, fake.€▯▯▯▯▯▯€phishing Many phtoocopiers have hard drives, just as computers do, which makes them a pot ential target for identity thieves.€▯▯▯▯▯▯€TRUE A _______ can help block unwanted, unsolicited e▯mail.€▯▯▯▯▯▯€spam filter A _______ backs up only the files on a computer that have changed since the last time a backup was performed.€▯▯▯▯▯▯€incremental backup Which of the following is formally defined as any criminal action perpetrated pr imarily though the use of a computer?€▯▯▯▯▯▯€cybercrime Instant messaging programs are susceptible to virus attacks.€▯▯▯▯▯▯€TRUE _______ encourages internet users to reveal sensitive information that could lea d to identity theft by sending e▯mails that look like they are from legitimate c ompanies but are, in fact, fake.€▯▯▯▯▯▯€Phishing _______ are virtual communication paths that allow a computer to organize reques ts for information from other networks or computers.€▯▯▯▯▯▯€logical ports You can block logical ports to invaders and make your computer invisible to othe rs on the internet by installing:€▯▯▯▯▯▯€a firewall _______ is a process used by firewalls to assign internal IP addresses on a netw ork.€▯▯▯▯▯▯€Network address translation and NAT A _______ is a virus that is triggered when certain conditions are met, such as opening a file a certain number of times.€▯▯▯▯▯▯€logic bomb A _______ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.€▯▯▯▯▯▯€stealth Which of the following statements about cookies is NOT true?€▯▯▯▯▯▯€cookies obtain y our personal information by searching your hard drive. _______ is doing anything with a computer while you are being paid to do your jo b.€▯▯▯▯▯▯€cyberloafing When electrical current is supplied in excess of normal voltage, this results in a _______.€▯▯▯▯▯▯€power surge A ________ is a program that appears to be something useful or desirable but doe s something malicious in the background without your knowledge.€▯▯▯▯▯▯€trojan horse Drive▯by downloads occur when:€▯▯▯▯▯▯€a web site downloads harmful software onto you r computer. VPN stands for:€▯▯▯▯▯▯€Virtual private network _______ floods a computer with requests until it shuts down and refuses to answe r any requests for
More Less

Related notes for BTM 481

Log In


OR

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit