Chapter+19+Study+Guide

// Identify the choice that best completes the statement or answers the question. // 1. A strong password should. 2. To limit the potential damage from malware, it’s a good idea to create a(n) account to use for your everyday normal computer activities. 3. puts data into code that must be translated before it can be accessed, and can be applied to either a folder or file. 4. is a type of identity theft where the sender of an e-mail message scams you into responding with personal data about yourself. 5. A(n) is e-mail that does damage by tempting you to forward it to everyone in your e-mail address book with the intent of clogging up e-mail systems or to delete a critical Windows system file by convincing you the file is malicious. 6. is moving data from one application to another application or from one storage media to another, and most often involves a change in the way the data is formatted. 7. The protocols used to encrypt account names and passwords are called protocols. 8. Digital certificates are transported over the Internet and verified using standards. 9. displays pop-up ads based on your browsing habits. 10. is junk e-mail that you don’t want, that you didn’t ask for, and that gets in your way. 11. A(n) is a program that copies itself throughout a network or the Internet without a host program. 12. A is dormant code added to software and triggered at a predetermined time or by a predetermined event. 13. A does not need a host program to work; rather, it substitutes itself for a legitimate program. 14. A virus hides in an executable program or in a word-processing document that contains a macro. 15. A is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination. 16. As a virus replicates, it changes its characteristics. 17. Some viruses can continually transform themselves so they will not be detected by AV software that is looking for a particular characteristic. A virus that uses this technique is called a(n) virus. 18. A loads itself before the OS boot is complete and hijacks internal Windows components so that it masks information Windows provides to user-mode utilities such as Task Manager, Explorer, the Registry Editor, and AV software. // Complete each statement. // 19. Antivirus (AV) software detects a known virus by looking for distinguishing characteristics called. 20. A(n) utility fills every sector on a drive with zeroes. // Identify the letter of the choice that best matches the phrase or definition. // 21. Made up of several words with spaces allowed 22. A small program that can be downloaded by a Web site to your computer 23. A segment of data sent over a network connection 24. A type of smart card 25. Any unwanted program that means you harm and is transmitted to your computer without your knowledge 26. A program that replicates by attaching itself to other programs 27. Produces unwanted pop-up ads 28. Software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm 29. Software installed on your PC that disconnects your phone line from your ISP and dials up an expensive pay-per-minute phone number without your knowledge 30. What is social engineering?
 * Chapter 19 Study Guide **
 * Multiple Choice **
 * a. || combine uppercase and lowercase characters ||
 * b. || use consecutive letters or numbers ||
 * c. || contain at least 6 characters ||
 * d. || All of the above ||
 * a. || Administrator || c. || Limited User ||
 * b. || Backup Operator || d. || Guest ||
 * a. || Encryption || c. || Encapsulation ||
 * b. || Authentication || d. || Authorization ||
 * a. || Phishing || c. || Guerilla marketing ||
 * b. || Virus hoax || d. || Scam e-mail ||
 * a. || scam e-mail || c. || phishing e-mail ||
 * b. || virus hoax || d. || e-mail virus ||
 * a. || Data migration || c. || Data transformation ||
 * b. || Encryption || d. || Polymorphism ||
 * a. || authorization || c. || authentication ||
 * b. || user service || d. || encryption ||
 * a. || EFS || c. || AV ||
 * b. || CHAP || d. || PKI ||
 * a. || Spyware || c. || Virus ||
 * b. || Spam || d. || Adware ||
 * a. || Adware || c. || Spam ||
 * b. || Spyware || d. || A virus ||
 * a. || adware || c. || spyware ||
 * b. || virus || d. || worm ||
 * a. || virus || c. || Trojan horse ||
 * b. || logic bomb || d. || worm ||
 * a. || Trojan horse || c. || logic bomb ||
 * b. || virus || d. || browser hijacker ||
 * a. || boot sector || c. || multipartite ||
 * b. || script || d. || file ||
 * a. || file virus || c. || boot sector virus ||
 * b. || multipartite virus || d. || macro ||
 * a. || stealth || c. || script ||
 * b. || polymorphic || d. || multipartite ||
 * a. || multipartite || c. || encrypting ||
 * b. || stealth || d. || script ||
 * a. || Trojan horse || c. || stealth virus ||
 * b. || rootkit || d. || worm ||
 * Completion **
 * Matching **
 * a. || virus || f. || packet ||
 * b. || key fob || g. || spyware ||
 * c. || adware || h. || ActiveX control ||
 * d. || passphrase || i. || dialer ||
 * e. || malware ||||  ||
 * Short Answer **