All of the adhering to were height cybercrimes reported to the IC3 in 2012 EXCEPT ________.

You are watching: Regarding computer protection, quarantining is defined as ________.

theft of services

A ________ is a virus that is prompted on a certain date.

time bomb

A(n) ________ takes benefit of file transport techniques to spcheck out on its own.


A ________ is a virus that is attached to records such as Word or Excel records.

macro virus

Which of the following classifications of virsupplies can adjust its own code to prevent detection?


With regard to computer system security, quarantining is identified as ________.

placing a discovered virus in a secure are on the tough drive

A(n) ________ is the percent of virus code that is unique to a specific computer system virus.

virus signature

________ hackers break right into devices for non-malicious factors such as to test system defense vulnerabilities.


A packet sniffer is a regimen that deserve to enable a hacker to execute every one of the adhering to EXCEPT ________.

launch a denial of company (DoS) attack on your computer

A ________ allows a hacker to get access to your computer and take almost complete manage of it without your knowledge.


You can block logical ports from invaders and also make your computer invisible to others on the Internet by installing ________.

a firewall

Which of the following is formally defined as any criminal action perpetrated mostly through the use of a computer?


________ floods a computer system through researches until it shuts dvery own and also refprovides to answer any kind of requests for information.

A DDoS attack

A ________ is named after a real estate construction function that slows the spread of fires from house to home.


Configuring a firewall to neglect all incoming packets that request access to a particular port is known as ________.

logical port blocking

Rules for creating passwords encompass all of the following EXCEPT ________.

use a dictionary to find an extensive word that is easy to remember

CAPTCHA stands for ________.

Completely Automated Public Turing Test to Tell Computers and also Humans Apart

Adware and spyware are described collectively as ________.


________ is a routine that gathers information about your surfing behavior without your understanding.


Which of the adhering to statements about cookies is NOT true?

Cookies achieve your individual information by looking your hard drive.

Social ________ is any kind of approach that uses social skills to geneprice humale interaction that entices people to reveal sensitive information.


When malicious code is planted on your computer system and alters your browser’s capacity to discover internet addresses, it is well-known as ________.


The Internet Crime Complaint Center (IC3) is a partnership in between the ________.

FBI and National White Collar Crime Center

Using your computer for non-occupational activities while you are being phelp to occupational is known as ________.


FBI-connected scams involve ________.

civilization pretending to represent main organizations

Creating and distributing ________ is one of the many widespcheck out types of cybercrimes.

computer system viruses

Creating and spreading digital virprovides is a cybercrime.


A time bomb virus can be motivated on a details day.


All viruses reason severe damage of computer information.


The terms virus and also worm actually mean the very same thing.


Which of the following is NOT a virus category?


A macro virus is a virus that is attached to a document such as a Word document or Excel workbook.


A virus signature is a part of virus code that is unique to a specific computer system virus.


Currently, tbelow are no antivirus programs for mobile gadgets.


An encryption virus replicates itself onto a hard drive’s understand boot record.


A worm does NOT require humale interaction to spcheck out to various other computers.


A zombie is an additional person’s computer regulated by a hacker.


A denial-of-service attack deserve to be used to deny hackers accessibility to a computer system device.


A stealth virus is designed to infect multiple file types to fool the antivirus software.


To produce a secure password, you should usage a mixture of upperinstance letters, lowersituation letters, and signs.


Ethical hackers are likewise recognized as white-hat hackers.

See more: Dreaming Of Bleeding While Pregnant Mean? Dream Of Miscarriage


All of the adhering to are methods that deserve to infect your computer system with a virus EXCEPT ________.