Computer Affairs
1. In a survey
of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A). 20
B). 75
C). 85
D). 99
Answer: C
2. The survey showed that these businesses lost more than ____________ due to security breaches.
A). $100,000 each
B). $377 million
C). five employees each
D). $1 million
Answer: B
A). 20
B). 75
C). 85
D). 99
Answer: C
2. The survey showed that these businesses lost more than ____________ due to security breaches.
A). $100,000 each
B). $377 million
C). five employees each
D). $1 million
Answer: B
3. The typical computer criminal is a(n):
A). young hacker.
B). trusted employee with no criminal record.
C). trusted employee with a long, but unknown criminal record.
D). overseas young cracker.
Answer: B
4. The majority of computer crimes are committed by:
A). hackers.
B). insiders.
C). overseas criminals.
D). young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A). spooling.
B). identity theft.
C). spoofing.
D). hacking.
Answer: C
6. Collecting personal information and effectively posing as another individual is known as the crime of:
A). spooling.
B). identity theft.
C). spoofing.
D). hacking.
Answer: B
7. Malicious software is known as:
A). badware.
B). malware.
C). maliciousware.
D). illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A). worm.
B). Trojan horse.
C). virus.
D). macro virus.
Answer: B
9. An
intentionally disruptive program that spreads from program to program or from
disk to disk is known as a:
A). Trojan horse.
B). virus.
C). time bomb.
D). time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A). e-mail virus.
B). macro virus.
C). Trojan horse.
D). Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A). Time bomb
B). Worm
C). Melissa virus
D). Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A). memory or disk space.
B). time.
C). CD drive space.
D). CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related event, it is known as a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A). A virus
B). Spybot
C). Logic bomb
D). Security patch
Answer: B
A). Trojan horse.
B). virus.
C). time bomb.
D). time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A). e-mail virus.
B). macro virus.
C). Trojan horse.
D). Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A). Time bomb
B). Worm
C). Melissa virus
D). Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A). memory or disk space.
B). time.
C). CD drive space.
D). CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related event, it is known as a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A). time-related bomb sequence.
B). virus.
C). time bomb.
D). Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A). A virus
B). Spybot
C). Logic bomb
D). Security patch
Answer: B
16.
Standardization of Microsoft programs and the Windows operating system has made
the spread of viruses:
A). more complicated.
B). more difficult.
C). easier.
D). slower.
Answer: C
17. HTML viruses infect:
A). your computer.
B). a Web page in the HTML code.
C). both a Web page and the computer that is viewing it.
D). No
18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B). refresh patches.
C). security repairs.
D). security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A). a virus.
B). a Trojan horse.
C). cracking.
D). a denial of service attack.
Answer: D
20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A). Biometrics
B). Biomeasurement
C). Computer security
D). Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A). User logins
B). Passwords
C). Computer keys
D). Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A). love.
B). Fred.
C). God.
D). 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A). hacker-proof program.
B). firewall.
C). hacker-resistant server.
D). encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A). encryption.
B). a firewall.
C). scrambling.
D). password-proofing.
Answer: A
25. If you want to secure a message, use a(n):
A). cryptology source.
B). encryption key.
C). encryption software package.
D). cryptosystem.
Answer: D
A). more complicated.
B). more difficult.
C). easier.
D). slower.
Answer: C
17. HTML viruses infect:
A). your computer.
B). a Web page in the HTML code.
C). both a Web page and the computer that is viewing it.
D). No
18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B). refresh patches.
C). security repairs.
D). security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A). a virus.
B). a Trojan horse.
C). cracking.
D). a denial of service attack.
Answer: D
20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A). Biometrics
B). Biomeasurement
C). Computer security
D). Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A). User logins
B). Passwords
C). Computer keys
D). Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A). love.
B). Fred.
C). God.
D). 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A). hacker-proof program.
B). firewall.
C). hacker-resistant server.
D). encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A). encryption.
B). a firewall.
C). scrambling.
D). password-proofing.
Answer: A
25. If you want to secure a message, use a(n):
A). cryptology source.
B). encryption key.
C). encryption software package.
D). cryptosystem.
Answer: D
0 comments:
Post a Comment