DCF Ch 4 and Ch 5 Test B Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. a. firewall c. threat neutralizer b. antihacker d. protection utility ____ 2. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information. a. Phishing c. Pharming b. Zipping d. Authenticating ____ 3. A ____ is a private combination of characters associated with the user name that allows access to certain computer resources. a. folder c. user name b. password d. cipher ____ 4. A ____ boot is the process of using the operating system to restart a computer. a. warm c. start b. cold d. new ____ 5. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer. a. paging c. swapping b. spooling d. waiting ____ 6. A(n) ____________________ hides within or looks like a legitimate program such as a screen saver. a. zombie c. Trojan horse b. worm d. rookit ____ 7. When turning on a computer that has been powered off completely, you are performing a(n) ____________________. a. deframentation c. warm boot b. cold boot d. compressed file ____ 8. A(n) ____________________ copies itself repeatedly in memory using up system resources and possibly shutting the computer system down. a. worm c. zombie b. trojan horse d. unzipped file ____ 9. A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. a. user name c. client b. password d. cycle ____ 10. ____________________ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. a. zombie c. worm b. spyware d. spam ____ 11. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. a. firewall c. virus b. agent d. spyware DCF Ch 5 Test Version B Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 12. The term ____ refers to online or Internet-based illegal acts. a. malware c. cybercrime b. cyberthreat d. cyberextortion ____ 13. As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____. a. spyware c. cookies b. spam d. adware ____ 14. ____ occurs when someone steals personal or confidential information. a. Plagiarism c. Information theft b. Decryption d. Cyberpiracy ____ 15. Computer ____ are the moral guidelines that govern the use of computers and information systems. a. logistics c. ethics b. mechanics d. rights ____ 16. ____ can lead to system failure. a. Aging hardware b. Natural disasters, such as fires, floods, or hurricanes c. Errors in computer programs d. All of the above ____ 17. As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. a. DoS c. DRM b. social engineering d. scamming ____ 18. As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources. a. PIN c. secure key b. password d. passterm ____ 19. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. a. security c. terrorism b. liability d. network ____ 20. A ____ has the same intent as a cracker but does not have the technical skills and knowledge. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ____ 21. ____ theft is the act of stealing computer equipment. a. Hardware b. Cyber c. SMS d. Software ____ 22. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. a. Rebuking c. Transmitting b. Spoofing d. Victimizing ____ 23. A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ____ 24. ____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. a. An anti-spam program c. An antivirus program b. E-mail encryption d. E-mail filtering ____ 25. Any illegal act involving a computer generally is referred to as a ____. a. cyberthreat c. malware b. computer crime d. hoax ____ 26. A ____ is someone who uses e-mail as a vehicle for extortion. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist True/False Indicate whether the statement is true or false. ____ 27. Digital forensics collection & analysis of evidence found on computers & networks. ____ 28. Hackers use computer automated tools to assist them with guessing passwords. ____ 29. Encrypted data is ussed to preven unauthorized access to computer systems. ____ 30. A cyberextortionist is someone who uses the Internet or a network to destroy or damage computers for political reasons. ____ 31. A cookie is a small text file that a Web server stores on a computer. ____ 32. In most cases locking doors and windows are adequate to protect computer equipment from hardware theft. ____ 33. Spam is a program placed on a computer without the user’s knowledge that secretly collects information about the user. ____ 34. A backdoor is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. ____ 35. A rootkit is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action