Document Sample
CS200-Chapter10-Homework Powered By Docstoc
					Name: ________________________ Class: ___________________ Date: __________                                      ID: A


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    1. A(n) ____ is any event or action that could cause a loss of or damage to computer hardware, software, data,
           information, or processing capability.
           a. security                                     c. terrorism
           b. liability                                    d. network

____    2. Any illegal act involving a computer generally is referred to as a ____.
           a. cyberthreat                                  c. malware
           b. computer crime                               d. hoax

____    3. The term ____ refers to online or Internet-based illegal acts.
           a. malware                                      c. cybercrime
           b. cyberthreat                                  d. cyberextortion

____    4. A(n) ____ has the same intent as a cracker but does not have the technical skills and knowledge.
           a. hacker                                       c. cyberextortionist
           b. script kiddie                                d. cyberterrorist

____    5. A(n) ____ is someone who uses e-mail as a vehicle for extortion.
           a. hacker                                     c. cyberextortionist
           b. script kiddie                              d. cyberterrorist

____    6. A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
           a. hacker                                      c. cyberextortionist
           b. script kiddie                               d. cyberterrorist

____    7. A(n) ____ is the destructive event or prank malware is intended to deliver.
           a. payload                                     c. spoof
           b. hoax                                        d. rebuke

____    8. All of the following are common ways computers become infected with malware, except ____.
           a. opening infected files
           b. running an infected program
           c. booting the computer with infected removable media inserted in a drive or plugged in a
           d. installing a software package from a CD

____    9. Currently, more than ____ known viruses, worms, and Trojan horse programs exist.
           a. 11,000                                    c. 151,000
           b. 22,000                                    d. 180,000

____ 10. In applications that allow users to write ____, the security level should be set so the application warns users
         that a document they are attempting to open contains a macro.
         a. Javascript                                     c. antivirus definitions
         b. macros                                         d. antispyware definitions

Name: ________________________                                                                                ID: A

____ 11. ____ protects a computer against viruses by identifying and removing any computer viruses found in
         memory, on storage media, or on incoming files.
         a. An anti-spam program                        c. An antivirus program
         b. E-mail encryption                           d. E-mail filtering

____ 12. If an antivirus program cannot remove an infection, it often ____.
         a. quarantines the infected file               c. disables the drive the file is on
         b. reports the user computer                   d. removes the user from its registry

____ 13. A virus hoax often is in the form of a(n) ____.
         a. photo attachment                             c.    chain letter
         b. newsletter                                   d.    advertisement

____ 14. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim
         computer or network.
         a. Rebuking                                      c. Transmitting
         b. Spoofing                                      d. Victimizing

____ 15. All networked and online computer users should implement a ____ like the one shown in the accompanying
         a. firewall solution                          c. DoS attack
         b. back door                                  d. all of the above

____ 16. As shown in the accompanying figure, a ____ is hardware and/or software that protects a network’s resources
         from intrusion by users on another network such as the Internet.
         a. quarantine                                  c. firewall
         b. biometric device                            d. router

Name: ________________________                                                                                 ID: A

____ 17. ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies
         any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or
         system breaches, including violations of firewalls like the ones in the accompanying figure.
         a. Violation                                     c. Intrusion
         b. Password                                      d. Traffic

____ 18. ____ is a server outside a company’s network that controls which communications pass into the company’s
         a. A firewall                                  c. A proxy server
         b. Intrusion detection software                d. An audit trail

____ 19. Which of the following is not true of intrusion detection software?
         a. It is complex.                                c. It is inexpensive.
         b. It is difficult to interpret.                 d. It is not designed for home use.

____ 20. Many systems implement access controls using a two-phase process called ____.
         a. access or deny                            c. access and approval
         b. identification and authentication         d. identification and approval

____ 21. If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average
         time it would take a computer to discover the password is ____.
         a. 1 second                                      c. 7 minutes
         b. 30 seconds                                    d. 2 hours

____ 22. As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique
         combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
         a. term                                           c. name
         b. link                                           d. key

Name: ________________________                                                                             ID: A

____ 23. As shown in the accompanying figure, many Web sites require a user to enter a(n) ____, which is a private
         combination of characters associated with a user name that allows access to certain computer resources.
         a. PIN                                          c. secure key
         b. password                                     d. passterm

____ 24. Which of the following is an example of a possessed object?
         a. user name and password                      c. badges and keys
         b. face recognition systems                    d. fingerprint scanner

____ 25. Which of the following is not an example of a biometric device?
         a. smart card                                  c. hand geometry system
         b. face recognition system                     d. fingerprint scanner

Name: ________________________                                                                                 ID: A

____ 26. A(n) ____ device like the one in the accompanying figure authenticates a person’s identity by translating a
         personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code
         stored in the computer verifying a physical or behavioral characteristic.
         a. authentication                                  c. identification
         b. personal                                        d. biometric

____ 27. ____ theft is the act of stealing computer equipment.
         a. Hardware                                      c. SMS
         b. Cyber                                         d. Software

____ 28. Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies
         a program.
         a. theft                                     c. piracy
         b. extortion                                 d. terrorism

Name: ________________________                                                                            ID: A

____ 29. To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one
         shown in the accompanying figure, which gives users the right to use the software.
         a. intellectual property                       c. access
         b. license                                     d. copyright

____ 30. ____ occurs when someone steals personal or confidential information.
         a. Plagiarism                                 c. Information theft
         b. Decryption                                 d. Cyberpiracy

____ 31. Which method of encryption inserts characters between existing characters?
         a. transposition                               c. expansion
         b. substitution                                d. compaction

Name: ________________________                                                                                 ID: A

____ 32. ____ can lead to system failure.
         a. Aging hardware
         b. Natural disasters, such as fires, floods, or hurricanes
         c. Errors in computer programs
         d. All of the above

____ 33. A(n) ____ is the prolonged malfunction of a computer.
         a. hardware vandalism                         c. unauthorized access
         b. system failure                             d. software theft

____ 34. A(n) ____ protector uses special electrical components to provide a stable current flow to the computer and
         other electronic equipment.
         a. Joule                                        c. surge
         b. spike                                        d. hash

____ 35. A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
         a. TSR                                          c. RIT
         b. RSI                                          d. TRI

____ 36. Computer ____ are the moral guidelines that govern the use of computers and information systems.
         a. logistics                                  c. ethics
         b. mechanics                                  d. rights

____ 37. Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of
         information about them.
         a. rights                                        c. restrictions
         b. acceptable use                                d. privacy

Name: ________________________                                                                               ID: A

____ 38. As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple
         recipients or newsgroups at once is called ____.
         a. spyware                                       c. cookies
         b. spam                                          d. adware

____ 39. Social engineers can obtain information by ____.
         a. snooping around computers looking for openly displayed confidential information
         b. watching or filming people dialing telephone numbers or using ATMs
         c. sifting through company dumpsters
         d. all of the above

____ 40. As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential
         information by taking advantage of the trusting human nature of some victims and the naivety of others.
         a. DoS                                           c. DRM
         b. social engineering                            d. scamming

Indicate whether the statement is true or false.

____ 41. Computer crime refers to online or Internet-based illegal acts.

____ 42. The term, cracker, originally was a complimentary word for a computer enthusiast.

Name: ________________________                                                                                ID: A

____ 43. Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and
         access files on the remote computer.

____ 44. Most antivirus programs do not provide updated virus signature files for users.

____ 45. Shrink-wrapped software from major developers does not need to be scanned for infections.

____ 46. A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to
         a victim computer or network.

____ 47. The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal

____ 48. Some operating systems, such as Windows, include personal firewalls like the ones shown in the
         accompanying figure.

____ 49. Companies should review successful access attempts for irregularities.

Name: ________________________                                                                               ID: A

____ 50. Most systems require that users select their own passwords, to be entered in forms such as the one shown in
         the accompanying figure.

____ 51. Hackers use computer automated tools to assist them with guessing passwords like the one shown in the
         accompanying figure.

____ 52. If a shorter password were in use in the accompanying figure, it would provide greater security than a longer

____ 53. Physical access controls, such as locked doors and windows, usually are adequatre to protect computer
         equipment from hardware theft.

____ 54. For visually impaired users, the CAPTCHA text can be read aloud.

Name: ________________________                                                                            ID: A

____ 55. With a license agreement like the one shown in the accompanying figure, the user becomes the owner of the

____ 56. Software users with a EULA like the one in the accompanying figure may make as many backup copies of the
         software as they want.

____ 57. An encryption key often uses a combination of encryption methods.

____ 58. Electrical power variation is one of the least common causes of system failure.

____ 59. If computer equipment is networked, a single power disturbance can damage multiple systems.

____ 60. With a selective backup, users decide which folders and files to include in a backup.

____ 61. Wireless access poses additional security risks.

Name: ________________________                                                                            ID: A

____ 62. To access a wireless network, perpetrators must be in the range of the wireless network.

____ 63. Copyright law gives the public fair use to copyrighted material.

____ 64. If you disable cookie use, you will not be able to use many of the e-commerce Web sites.

____ 65. Spam is a program placed on a computer without the user’s knowledge that secretly collects information
         about the user.


Shared By: