Cybercrime and Computer Viruses Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is cybercrime?

  • Criminal action unrelated to computers
  • Criminal activities carried out in physical locations
  • Any criminal action perpetrated primarily through the use of a computer (correct)
  • Only financial crimes committed using a computer

How can hackers attack computing devices?

  • Using malware and social engineering techniques (correct)
  • By sending polite requests for access
  • Only through direct physical access to the device
  • By exploiting hardware vulnerabilities only

What is the purpose of a firewall?

  • To prevent software installation on the computer
  • To physically protect the computer from external threats
  • To encrypt all data on the computer
  • To monitor and control incoming and outgoing network traffic (correct)

What is social engineering?

<p>A technique that uses social skills to manipulate people into revealing sensitive information (B)</p> Signup and view all the answers

What is phishing?

<p>Luring people into revealing sensitive information (C)</p> Signup and view all the answers

What is scareware?

<p>Malware that convinces users their computer is infected and directs them to a fake website (A)</p> Signup and view all the answers

How can I protect my physical computing assets from theft?

<p>Use software to detect movement for laptops and track location if stolen (C)</p> Signup and view all the answers

Which type of cybercrime involves overloading systems to deny legitimate users access?

<p>Denial-of-service attacks (B)</p> Signup and view all the answers

What type of viruses require human interaction to spread and can infect smartphones and tablets?

<p>Worms (A)</p> Signup and view all the answers

What are Trojan horses and rootkits used for by hackers?

<p>To gain control of computers without the user's knowledge (B)</p> Signup and view all the answers

Viruses are the only type of cyber threat that can harm your computer.

<p>False (B)</p> Signup and view all the answers

A firewall is a software or hardware device that monitors and controls incoming and outgoing network traffic.

<p>True (A)</p> Signup and view all the answers

Creating secure passwords and managing them is not important for protecting your digital assets.

<p>False (B)</p> Signup and view all the answers

Spyware runs in the background and transmits your information for marketing purposes.

<p>True (A)</p> Signup and view all the answers

Phishing involves luring people into revealing sensitive information such as credit card details and social security numbers.

<p>True (A)</p> Signup and view all the answers

A surge protector needs to be replaced every 2-3 years and should be used with all devices that have solid-state components.

<p>True (A)</p> Signup and view all the answers

Scareware attempts to convince you that your computer is infected and then directs you to a website where you can buy fake removal or antivirus tools.

<p>True (A)</p> Signup and view all the answers

Computer viruses can only infect desktop and laptop computers, not smartphones and tablets

<p>False (B)</p> Signup and view all the answers

Antivirus software needs to be kept up to date to detect new viruses

<p>True (A)</p> Signup and view all the answers

Hackers are only classified as either white-hat or black-hat, there are no grey-hat hackers

<p>False (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Cybercrime and Computer Viruses

  • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
  • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
  • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
  • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
  • Symptoms of a computer virus infection are detailed in the textbook
  • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
  • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
  • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
  • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
  • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
  • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
  • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

Cybercrime and Computer Viruses

  • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
  • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
  • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
  • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
  • Symptoms of a computer virus infection are detailed in the textbook
  • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
  • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
  • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
  • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
  • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
  • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
  • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

tia12e_ch09 copy.pptx

More Like This

Computer Virus and Cybercrime Quiz
10 questions

Computer Virus and Cybercrime Quiz

AccommodativeBlankVerse avatar
AccommodativeBlankVerse
Cybercrime and Computer Security
28 questions

Cybercrime and Computer Security

WellManagedButtercup5958 avatar
WellManagedButtercup5958
Use Quizgecko on...
Browser
Browser