Cybercrime and Computer Viruses Quiz

IndebtedOwl avatar
IndebtedOwl
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is cybercrime?

Any criminal action perpetrated primarily through the use of a computer

How can hackers attack computing devices?

Using malware and social engineering techniques

What is the purpose of a firewall?

To monitor and control incoming and outgoing network traffic

What is social engineering?

<p>A technique that uses social skills to manipulate people into revealing sensitive information</p> Signup and view all the answers

What is phishing?

<p>Luring people into revealing sensitive information</p> Signup and view all the answers

What is scareware?

<p>Malware that convinces users their computer is infected and directs them to a fake website</p> Signup and view all the answers

How can I protect my physical computing assets from theft?

<p>Use software to detect movement for laptops and track location if stolen</p> Signup and view all the answers

Which type of cybercrime involves overloading systems to deny legitimate users access?

<p>Denial-of-service attacks</p> Signup and view all the answers

What type of viruses require human interaction to spread and can infect smartphones and tablets?

<p>Worms</p> Signup and view all the answers

What are Trojan horses and rootkits used for by hackers?

<p>To gain control of computers without the user's knowledge</p> Signup and view all the answers

Viruses are the only type of cyber threat that can harm your computer.

<p>False</p> Signup and view all the answers

A firewall is a software or hardware device that monitors and controls incoming and outgoing network traffic.

<p>True</p> Signup and view all the answers

Creating secure passwords and managing them is not important for protecting your digital assets.

<p>False</p> Signup and view all the answers

Spyware runs in the background and transmits your information for marketing purposes.

<p>True</p> Signup and view all the answers

Phishing involves luring people into revealing sensitive information such as credit card details and social security numbers.

<p>True</p> Signup and view all the answers

A surge protector needs to be replaced every 2-3 years and should be used with all devices that have solid-state components.

<p>True</p> Signup and view all the answers

Scareware attempts to convince you that your computer is infected and then directs you to a website where you can buy fake removal or antivirus tools.

<p>True</p> Signup and view all the answers

Computer viruses can only infect desktop and laptop computers, not smartphones and tablets

<p>False</p> Signup and view all the answers

Antivirus software needs to be kept up to date to detect new viruses

<p>True</p> Signup and view all the answers

Hackers are only classified as either white-hat or black-hat, there are no grey-hat hackers

<p>False</p> Signup and view all the answers

Study Notes

Cybercrime and Computer Viruses

  • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
  • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
  • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
  • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
  • Symptoms of a computer virus infection are detailed in the textbook
  • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
  • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
  • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
  • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
  • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
  • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
  • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

Cybercrime and Computer Viruses

  • Common types of cybercrimes include FBI-related scams, non-delivery scams, identity theft, advanced fee scams, and hacking
  • Computer viruses can also infect smartphones and tablets, requiring human interaction to spread
  • Major categories of computer viruses include boot-sector viruses, logic bomb viruses, time bomb viruses, worms, email viruses, and encryption viruses
  • Additional virus classifications include polymorphic viruses, multipartite viruses, and stealth viruses
  • Symptoms of a computer virus infection are detailed in the textbook
  • Antivirus software such as Windows Defender, Symantec, Kaspersky, AVG, and McAfee can detect and protect against viruses
  • Antivirus software must be kept up to date to detect new viruses and can run in the background when the CPU is not busy
  • Hackers are classified as white-hat or ethical hackers, black-hat hackers, and grey-hat hackers
  • Trojan horses and rootkits are used by hackers to gain control of computers without the user's knowledge
  • Denial-of-service attacks use zombies to overload systems and deny legitimate users access
  • Logical and physical ports can be exploited by hackers, and firewalls can be used to restrict access to digital assets
  • Strong passwords and biometric authentication devices such as fingerprint, iris pattern, voice, and face recognition can enhance security and protect digital property

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Cybercrime Quiz
5 questions

Cybercrime Quiz

ResplendentMorganite avatar
ResplendentMorganite
Cybercrime and Cybercrime Laws Quiz
5 questions
Computer Law and Cybercrime Quiz
10 questions
Use Quizgecko on...
Browser
Browser