All of the adhering to were height cybercrimes reported to the IC3 in 2012 EXCEPT ________.
theft of services
A ________ is a virus that is prompted on a certain date.
A(n) ________ takes benefit of file transport techniques to spcheck out on its own.
A ________ is a virus that is attached to records such as Word or Excel records.
Which of the following classifications of virsupplies can adjust its own code to prevent detection?
With regard to computer system security, quarantining is identified as ________.
placing a discovered virus in a secure are on the tough drive
A(n) ________ is the percent of virus code that is unique to a specific computer system virus.
________ hackers break right into devices for non-malicious factors such as to test system defense vulnerabilities.
A packet sniffer is a regimen that deserve to enable a hacker to execute every one of the adhering to EXCEPT ________.
launch a denial of company (DoS) attack on your computer
A ________ allows a hacker to get access to your computer and take almost complete manage of it without your knowledge.
You can block logical ports from invaders and also make your computer invisible to others on the Internet by installing ________.
Which of the following is formally defined as any criminal action perpetrated mostly through the use of a computer?
________ floods a computer system through researches until it shuts dvery own and also refprovides to answer any kind of requests for information.
A DDoS attack
A ________ is named after a real estate construction function that slows the spread of fires from house to home.
Configuring a firewall to neglect all incoming packets that request access to a particular port is known as ________.
logical port blocking
Rules for creating passwords encompass all of the following EXCEPT ________.
use a dictionary to find an extensive word that is easy to remember
CAPTCHA stands for ________.
Completely Automated Public Turing Test to Tell Computers and also Humans Apart
Adware and spyware are described collectively as ________.
________ is a routine that gathers information about your surfing behavior without your understanding.
Which of the adhering to statements about cookies is NOT true?
Cookies achieve your individual information by looking your hard drive.
Social ________ is any kind of approach that uses social skills to geneprice humale interaction that entices people to reveal sensitive information.
When malicious code is planted on your computer system and alters your browser’s capacity to discover internet addresses, it is well-known as ________.
The Internet Crime Complaint Center (IC3) is a partnership in between the ________.
FBI and National White Collar Crime Center
Using your computer for non-occupational activities while you are being phelp to occupational is known as ________.
FBI-connected scams involve ________.
civilization pretending to represent main organizations
Creating and distributing ________ is one of the many widespcheck out types of cybercrimes.
computer system viruses
Creating and spreading digital virprovides is a cybercrime.
A time bomb virus can be motivated on a details day.
All viruses reason severe damage of computer information.
The terms virus and also worm actually mean the very same thing.
Which of the following is NOT a virus category?
A macro virus is a virus that is attached to a document such as a Word document or Excel workbook.
A virus signature is a part of virus code that is unique to a specific computer system virus.
Currently, tbelow are no antivirus programs for mobile gadgets.
An encryption virus replicates itself onto a hard drive’s understand boot record.
A worm does NOT require humale interaction to spcheck out to various other computers.
A zombie is an additional person’s computer regulated by a hacker.
A denial-of-service attack deserve to be used to deny hackers accessibility to a computer system device.
A stealth virus is designed to infect multiple file types to fool the antivirus software.
To produce a secure password, you should usage a mixture of upperinstance letters, lowersituation letters, and signs.
Ethical hackers are likewise recognized as white-hat hackers.
All of the adhering to are methods that deserve to infect your computer system with a virus EXCEPT ________.