Answer: attachmentsDiff: 1Section Ref: Catching a Virus
34) A(n) ________ virus is a series of commands that is executed without yourknowledge. Answer: scriptDiff: 2Section Ref: Script and Macro Viruses35) A(n) ________ virus runs a program that searches for common data files,compresses them, and makes them unusable.Answer: encryptionDiff: 3Section Ref: Encryption Viruses36) A(n) ________ virus is designed to infect multiple file types in an effort tofool antivirus software.Answer: multipartiteDiff: 3Section Ref: Additional Virus Classifications37) A(n) ________ virus temporarily erases its code from the files where itresides, and then hides in the active memory of the computer.Answer: stealthDiff: 3Section Ref: Additional Virus Classifications38) Another name for bots is ________.Answer: web robotsDiff: 2Section Ref: Bits & Bytes CAPTCHA: Keeping Websites Safe from Bots39) During the process of ________, the antivirus software records keyattributes about the files on your computer and keeps these statistics in asafe place on your hard drive.Answer: inoculationDiff: 2Section Ref: Antivirus Software40) The best defense against viruses is to install ________ software, which isspecifically designed to detect viruses and protect your computer and filesfrom harm.Answer: antivirusDiff: 1Section Ref: Preventing Virus Infections
41) ________ occur when a website downloads harmful software onto yourcomputer. Answer: Drive-by downloadsDiff: 3Section Ref: Software Updates42) A(n) ________-hat hacker illegally penetrates a system simply todemonstrate the hacker's expertise to the system administrator.Answer: greygrayDiff: 2Section Ref: Understanding Hackers43) Another name for a sniffer is a(n) ________ analyzer. Answer: packetDiff: 2Section Ref: Problems Hackers Can Cause44) A(n) ________ is composed of software programs known as bots, whichrun autonomously on a large number of zombie computers.Answer: botnetDiff: 2Section Ref: Denial-of-Service Attacks45) Most often, hackers initiate a DDoS attack by creating and activating________ computers. Answer: zombieDiff: 2Section Ref: Denial-of-Service Attacks46) Devices that use a unique personal characteristic, such as a fingerprint,in place of a password are called ________ authentication devices.Answer: biometricDiff: 2Section Ref: Biometric Authentication Devices47) ________ is the act of tricking people into revealing sensitive informationand is often associated with credit card fraud.Answer: PhishingDiff: 2Section Ref: Phishing and Pharming48) A(n) ________ protects a computer against power surges. Answer: surgeprotector
Diff: 1Section Ref: Power Surges49) Spyware programs that monitor keystrokes with the intent of stealingpasswords, login IDs, or credit card information are referred to as ________.Answer: keystroke loggerskey loggersDiff: 2Section Ref: Malware: Adware and Spyware50) A(n) ________ can help block unwanted, unsolicited e-mail. Answer: spamfilterDiff: 1Section Ref: Spam51) Unwanted, unsolicited e-mail is referred to as ________. Answer: spamDiff: 1Section Ref: Spam52) A(n) ________ backup backs up only the files on a computer that havechanged since the last time a backup was performed.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 205 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Winter
Professor
RickHenderson
Tags
Section Ref