BCIS 110 FINAL EXAM QUESTIONS WITH VERIFIED
ACCURATE ANSWERS
________ floods a computer with requests until it shuts down and refuses to answer
any requests for information. - Answers - A DDoS attack
Which of the following statements about cookies is NOT true? - Answers - Cookies
obtain your personal information by searching your hard drive.
A stealth virus is designed to infect multiple file types to fool the antivirus software. -
Answers - false
Creating and distributing ________ is one of the most widespread types of cybercrimes.
- Answers - computer viruses
Currently, there are no antivirus programs for mobile devices. - Answers - false
The Internet Crime Complaint Center (IC3) is a partnership between the ________. -
Answers - FBI and National White Collar Crime Center
Regarding computer protection, quarantining is defined as ________. - Answers -
placing a found virus in a secure area on the hard drive
A macro virus is a virus that is attached to a file. - Answers - true
Government impersonation scams involve ________. - Answers - people pretending to
represent official organizations such as the Dept. of Homeland Security or IRS
A worm does NOT require human interaction to spread to other computers. - Answers -
true
A(n) ________ backup makes a copy of all changes since the last backup. - Answers -
incremental
The terms virus and worm mean the same thing. - Answers - false
To create a secure password, you should use a mixture of uppercase letters, lowercase
letters, numbers, and symbols. - Answers - true
Ethical hackers are also known as white-hat hackers. - Answers - true
Virtual private networks (VPNs) are secure networks that are established without using
the public Internet infrastructure. - Answers - false
, Since you can always redownload program files, you do not need to include them in
backups. - Answers - false
All viruses cause serious destruction of computer data. - Answers - false
A denial-of-service attack can be used to deny hackers access to a computer system. -
Answers - false
Creating and spreading online viruses is a cybercrime. - Answers - true
Using your computer for non-work activities while you are being paid to work is known
as ________. - Answers - cyberloafing
A virus signature is a portion of virus code that is unique to a particular computer virus. -
Answers - true
All of the following are top cybercrimes reported to the IC3 EXCEPT ________. -
Answers - malware fraud
Which of the following classifications of viruses can change its own code to avoid
detection? - Answers - polymorphic
A packet analyzer is a program that can enable a hacker to do all of the following
EXCEPT ________. - Answers - launch a denial of service (DoS) attack on your
computer
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on
its own. - Answers - worm
Rules for creating passwords include all of the following EXCEPT ________. - Answers
- keep a master password that is the same for all of your accounts
A time bomb virus can be triggered on a certain date. - Answers - true
Viruses, adware, and spyware are referred to collectively as ________. - Answers -
grayware
Social ________ is any technique that uses social skills to generate human interaction
that entices individuals to reveal sensitive information. - Answers - engineering
Which of the following is NOT a virus category? - Answers - Pharming
When malicious code is planted on your computer and alters your browser's ability to
find web addresses, it is known as ________. - Answers - Pharming
ACCURATE ANSWERS
________ floods a computer with requests until it shuts down and refuses to answer
any requests for information. - Answers - A DDoS attack
Which of the following statements about cookies is NOT true? - Answers - Cookies
obtain your personal information by searching your hard drive.
A stealth virus is designed to infect multiple file types to fool the antivirus software. -
Answers - false
Creating and distributing ________ is one of the most widespread types of cybercrimes.
- Answers - computer viruses
Currently, there are no antivirus programs for mobile devices. - Answers - false
The Internet Crime Complaint Center (IC3) is a partnership between the ________. -
Answers - FBI and National White Collar Crime Center
Regarding computer protection, quarantining is defined as ________. - Answers -
placing a found virus in a secure area on the hard drive
A macro virus is a virus that is attached to a file. - Answers - true
Government impersonation scams involve ________. - Answers - people pretending to
represent official organizations such as the Dept. of Homeland Security or IRS
A worm does NOT require human interaction to spread to other computers. - Answers -
true
A(n) ________ backup makes a copy of all changes since the last backup. - Answers -
incremental
The terms virus and worm mean the same thing. - Answers - false
To create a secure password, you should use a mixture of uppercase letters, lowercase
letters, numbers, and symbols. - Answers - true
Ethical hackers are also known as white-hat hackers. - Answers - true
Virtual private networks (VPNs) are secure networks that are established without using
the public Internet infrastructure. - Answers - false
, Since you can always redownload program files, you do not need to include them in
backups. - Answers - false
All viruses cause serious destruction of computer data. - Answers - false
A denial-of-service attack can be used to deny hackers access to a computer system. -
Answers - false
Creating and spreading online viruses is a cybercrime. - Answers - true
Using your computer for non-work activities while you are being paid to work is known
as ________. - Answers - cyberloafing
A virus signature is a portion of virus code that is unique to a particular computer virus. -
Answers - true
All of the following are top cybercrimes reported to the IC3 EXCEPT ________. -
Answers - malware fraud
Which of the following classifications of viruses can change its own code to avoid
detection? - Answers - polymorphic
A packet analyzer is a program that can enable a hacker to do all of the following
EXCEPT ________. - Answers - launch a denial of service (DoS) attack on your
computer
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on
its own. - Answers - worm
Rules for creating passwords include all of the following EXCEPT ________. - Answers
- keep a master password that is the same for all of your accounts
A time bomb virus can be triggered on a certain date. - Answers - true
Viruses, adware, and spyware are referred to collectively as ________. - Answers -
grayware
Social ________ is any technique that uses social skills to generate human interaction
that entices individuals to reveal sensitive information. - Answers - engineering
Which of the following is NOT a virus category? - Answers - Pharming
When malicious code is planted on your computer and alters your browser's ability to
find web addresses, it is known as ________. - Answers - Pharming