Course Hero Logo

Answer attachments diff 1 section ref catching a

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 122 - 126 out of 205 pages.

Answer: attachmentsDiff: 1Section Ref: Catching a Virus
34) A(n) ________ virus is a series of commands that is executed without yourknowledge. Answer: scriptDiff: 2Section Ref: Script and Macro Viruses35) A(n) ________ virus runs a program that searches for common data files,compresses them, and makes them unusable.Answer: encryptionDiff: 3Section Ref: Encryption Viruses36) A(n) ________ virus is designed to infect multiple file types in an effort tofool antivirus software.Answer: multipartiteDiff: 3Section Ref: Additional Virus Classifications37) A(n) ________ virus temporarily erases its code from the files where itresides, and then hides in the active memory of the computer.Answer: stealthDiff: 3Section Ref: Additional Virus Classifications38) Another name for bots is ________.Answer: web robotsDiff: 2Section Ref: Bits & Bytes CAPTCHA: Keeping Websites Safe from Bots39) During the process of ________, the antivirus software records keyattributes about the files on your computer and keeps these statistics in asafe place on your hard drive.Answer: inoculationDiff: 2Section Ref: Antivirus Software40) The best defense against viruses is to install ________ software, which isspecifically designed to detect viruses and protect your computer and filesfrom harm.Answer: antivirusDiff: 1Section Ref: Preventing Virus Infections
41) ________ occur when a website downloads harmful software onto yourcomputer. Answer: Drive-by downloadsDiff: 3Section Ref: Software Updates42) A(n) ________-hat hacker illegally penetrates a system simply todemonstrate the hacker's expertise to the system administrator.Answer: greygrayDiff: 2Section Ref: Understanding Hackers43) Another name for a sniffer is a(n) ________ analyzer. Answer: packetDiff: 2Section Ref: Problems Hackers Can Cause44) A(n) ________ is composed of software programs known as bots, whichrun autonomously on a large number of zombie computers.Answer: botnetDiff: 2Section Ref: Denial-of-Service Attacks45) Most often, hackers initiate a DDoS attack by creating and activating________ computers. Answer: zombieDiff: 2Section Ref: Denial-of-Service Attacks46) Devices that use a unique personal characteristic, such as a fingerprint,in place of a password are called ________ authentication devices.Answer: biometricDiff: 2Section Ref: Biometric Authentication Devices47) ________ is the act of tricking people into revealing sensitive informationand is often associated with credit card fraud.Answer: PhishingDiff: 2Section Ref: Phishing and Pharming48) A(n) ________ protects a computer against power surges. Answer: surgeprotector
Diff: 1Section Ref: Power Surges49) Spyware programs that monitor keystrokes with the intent of stealingpasswords, login IDs, or credit card information are referred to as ________.Answer: keystroke loggerskey loggersDiff: 2Section Ref: Malware: Adware and Spyware50) A(n) ________ can help block unwanted, unsolicited e-mail. Answer: spamfilterDiff: 1Section Ref: Spam51) Unwanted, unsolicited e-mail is referred to as ________. Answer: spamDiff: 1Section Ref: Spam52) A(n) ________ backup backs up only the files on a computer that havechanged since the last time a backup was performed.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 205 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
RickHenderson
Tags
Section Ref

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture