Ch 5 Computer Safety and Security

advertisement
DCF Ch 4 Operating & Utility Systems and Ch 5 Computer Safety & Security
TEST A
Multiple Choice - Identify the choice that best completes the statement or answers the question.
____
1. A ____ boot is the process of using the operating system to restart a computer.
a. warm
c. start
b. cold
d. new
____
2. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of
sending them immediately to the printer.
a. paging
c. swapping
b. spooling
d. waiting
____
3. A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one
specific user.
a. user name
c. client
b. password
d. cycle
____
4. A ____ is a private combination of characters associated with the user name that allows access to certain
computer resources.
a. folder
c. user name
b. password
d. cipher
____
5. ____, is a utility that detects and protects a personal computer from unauthorized intrusions.
a. firewall
c. threat neutralizer
b. antihacker
d. Utility system
____
6. The term ____ describes a potentially damaging computer program that affects, or infects, a computer
negatively by altering the way the computer works without the user’s knowledge or permission.
a. firewall
c. virus
b. agent
d. spyware
____
7. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.
a. Phishing
c. Pharming
b. Zipping
d. Authenticating
____
8. When turning on a computer that has been powered off completely, you are performing a(n)
____________________.
a. downloading
c. warm boot
b. cold boot
d. compressed file
____
9. A(n) ____________________ copies itself repeatedly in memory using up system resources and possibly
shutting the computer system down.
a. worm
c. zombie
b. trojan horse
d. unzipped file
____ 10. A(n) ____________________ hides within or looks like a legitimate program such as a screen saver.
a. zombie
c. Trojan horse
b. worm
d. rookit
____ 11. ____________________ is a program placed on a computer without the user’s knowledge that secretly
collects information about the user.
a. zombie
c. worm
b. spyware
d. spam
Ch 5 Computer Safety and Security
Multiple Choice - Identify the choice that best completes the statement or answers the question.
____ 12. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware,
software, data, information, or processing capability.
a. security
c. terrorism
b. liability
d. network
____ 13. Any illegal act involving a computer generally is referred to as a ____.
a. cyberthreat
c. malware
b. computer crime
d. hoax
____ 14. The term ____ refers to online or Internet-based illegal acts.
a. malware
c. cybercrime
b. cyberthreat
d. cyberextortion
____ 15. A ____ has the same intent as a cracker but does not have the technical skills and knowledge.
a. hacker
c. cyberextortionist
b. script kiddie
d. cyberterrorist
____ 16. A ____ is someone who uses e-mail as a vehicle for extortion.
a. hacker
c. cyberextortionist
b. script kiddie
d. cyberterrorist
____ 17. A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
a. hacker
c. cyberextortionist
b. script kiddie
d. cyberterrorist
____ 18. ____ protects a computer against viruses by identifying and removing any computer viruses found in
memory, on storage media, or on incoming files.
a. An anti-spam program
c. An antivirus program
b. E-mail encryption
d. E-mail filtering
____ 19. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim
computer or network.
a. Rebuking
c. Transmitting
b. Spoofing
d. Victimizing
____ 20. As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private
combination of characters associated with a user name that allows access to certain computer resources.
a. PIN
c. secure key
b. password
d. passterm
____ 21. ____ theft is the act of stealing computer equipment.
a. Hardware
c. SMS
b. Cyber
d. Software
____ 22. ____ occurs when someone steals personal or confidential information.
a. Plagiarism
c. Information theft
b. Decryption
d. Cyberpiracy
____ 23. ____ can lead to system failure.
a.
b.
c.
d.
Aging hardware
Natural disasters, such as fires, floods, or hurricanes
Errors in computer programs
All of the above
____ 24. Computer ____ are the moral guidelines that govern the use of computers and information systems.
a. logistics
c. ethics
b. mechanics
d. rights
____ 25. As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple
recipients or newsgroups at once is called ____.
a. spyware
c. cookies
b. spam
d. adware
____ 26. As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential
information by taking advantage of the trusting human nature of some victims and the naivety of others.
a. DoS
c. DRM
b. social engineering
d. scamming
True/False
Indicate whether the statement is true or false.
____ 27. Hackers use computer automated tools to assist them with guessing passwords.
____ 28. In most cases locking doors and windows are adequate to protect computer equipment from hardware theft.
____ 29. A cookie is a small text file that a Web server stores on a computer.
____ 30. Spam is a program placed on a computer without the user’s knowledge that secretly collects information
about the user.
____ 31. Encrypted data is ussed to preven unauthorized access to computer systems.
____ 32. A rootkit is someone who accesses a computer or network illegally but has the intent of destroying data,
stealing information, or other malicious action.
____ 33. A backdoor is a program or set of instructions in a program that allow users to bypass security controls when
accessing a program, computer, or network.
____ 34. A cyberextortionist is someone who uses the Internet or a network to destroy or damage computers for
political reasons.
____ 35. Digital forensics collection & analysis of evidence found on computers & networks
Download