This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

Chapter 11: Computer Security and Safety, Ethics, and Privacy MULTIPLE CHOICE 1. A computer ____ risk is any event or action that could cause a loss of or damage to computer hard- ware, software, data, information, or processing capability. a. security c. terrorism b. liability d. network ANS: A PTS: 1 REF: 556 2. A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: B PTS: 1 REF: 556 3. A(n) ____ is someone who uses e-mail as a vehicle for extortion. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: C PTS: 1 REF: 557 4. A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: D PTS: 1 REF: 557 5. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a users knowledge and deliberately alter the computers operations. a. malware c. threats b. untrusted sources d. cybermals ANS: A PTS: 1 REF: 558 6. A(n) ____source is a company or person a user believes will not send a virus-infected file knowingly. a. legitimate c. secure b. trusted d. backup ANS: B PTS: 1 REF: 560 7. As shown in the accompanying figure, a(n) ____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. a. hoax c. antivirus b. secure d. antispyware ANS: C PTS: 1 REF: 560 8. A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. a. myth c. DoS b. threat d. hoax ANS: D PTS: 1 REF: 561 9. A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. a. distributed c. limited b. delayed d. staggered ANS: A PTS: 1 REF: 562 10. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. a. Rebuking c. Transmitting b. Spoofing d. Victimizing ANS: B PTS: 1 REF: 563 11. ____ use is the use of a computer or its data for unapproved or possibly illegal activities. a. Unacceptable c. Unauthorized b. Illegitimate d. Unenforced ANS: C PTS: 1 REF: 564 12. A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. a. access server c. secure site b. portal d. firewall ANS: D PTS: 1 REF: 564 13. ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious be- havior patterns or system breaches.... View Full Document

End of Preview

Sign up now to access the rest of the document