Menu

1. In a survey of more than 500 companies and government agencies, ____________ percent detected
computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security breaches.

A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B

3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime
of
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B

7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is
known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B

12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to someone
through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D


19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is
known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for security
access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
Do you Like this story..?

Get Free Email Updates Daily!

Follow us!

0 Give Feedback-Comment:

Post a Comment


Write your name And Email id also.
if You dont have gmail id use anonyms option . And write your name and email id

Free Home Delivery - No shipping Charges- Buy Books Online

Loading...
 
Top