Cybercrime and Computer Viruses Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is cybercrime?

  • Criminal action unrelated to computers
  • Criminal activities carried out in physical locations
  • Any criminal action perpetrated primarily through the use of a computer (correct)
  • Only financial crimes committed using a computer
  • How can hackers attack computing devices?

  • Using malware and social engineering techniques (correct)
  • By sending polite requests for access
  • Only through direct physical access to the device
  • By exploiting hardware vulnerabilities only
  • What is the purpose of a firewall?

  • To prevent software installation on the computer
  • To physically protect the computer from external threats
  • To encrypt all data on the computer
  • To monitor and control incoming and outgoing network traffic (correct)
  • What is social engineering?

    <p>A technique that uses social skills to manipulate people into revealing sensitive information</p> Signup and view all the answers

    What is phishing?

    <p>Luring people into revealing sensitive information</p> Signup and view all the answers

    What is scareware?

    <p>Malware that convinces users their computer is infected and directs them to a fake website</p> Signup and view all the answers

    How can I protect my physical computing assets from theft?

    <p>Use software to detect movement for laptops and track location if stolen</p> Signup and view all the answers

    Which type of cybercrime involves overloading systems to deny legitimate users access?

    <p>Denial-of-service attacks</p> Signup and view all the answers

    What type of viruses require human interaction to spread and can infect smartphones and tablets?

    <p>Worms</p> Signup and view all the answers

    What are Trojan horses and rootkits used for by hackers?

    <p>To gain control of computers without the user's knowledge</p> Signup and view all the answers

    Viruses are the only type of cyber threat that can harm your computer.

    <p>False</p> Signup and view all the answers

    A firewall is a software or hardware device that monitors and controls incoming and outgoing network traffic.

    <p>True</p> Signup and view all the answers

    Creating secure passwords and managing them is not important for protecting your digital assets.

    <p>False</p> Signup and view all the answers

    Spyware runs in the background and transmits your information for marketing purposes.

    <p>True</p> Signup and view all the answers

    Phishing involves luring people into revealing sensitive information such as credit card details and social security numbers.

    <p>True</p> Signup and view all the answers

    A surge protector needs to be replaced every 2-3 years and should be used with all devices that have solid-state components.

    <p>True</p> Signup and view all the answers

    Scareware attempts to convince you that your computer is infected and then directs you to a website where you can buy fake removal or antivirus tools.

    <p>True</p> Signup and view all the answers

    Computer viruses can only infect desktop and laptop computers, not smartphones and tablets

    <p>False</p> Signup and view all the answers

    Antivirus software needs to be kept up to date to detect new viruses

    <p>True</p> Signup and view all the answers

    Hackers are only classified as either white-hat or black-hat, there are no grey-hat hackers

    <p>False</p> Signup and view all the answers

    Study Notes

    Cybercrime and Computer Viruses

    • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
    • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
    • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
    • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
    • Symptoms of a computer virus infection are detailed in the textbook
    • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
    • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
    • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
    • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
    • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
    • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
    • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

    Cybercrime and Computer Viruses

    • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
    • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
    • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
    • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
    • Symptoms of a computer virus infection are detailed in the textbook
    • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
    • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
    • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
    • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
    • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
    • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
    • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    tia12e_ch09 copy.pptx

    Description

    Test your knowledge of cybercrime and computer viruses with this quiz. Explore common types of cybercrimes, major categories of computer viruses, symptoms of virus infections, and ways to protect against them. Learn about different types of hackers, malicious tools like Trojan horses and rootkits, and security measures such as antivirus software, firewalls, and biometric authentication.

    More Like This

    Use Quizgecko on...
    Browser
    Browser