Chapter 11 Test - Chapter 11: Computer Security and Safety,...

Chapter 11 Test
Download Document
Showing pages : 1 - 3 of 34
This preview has blurred sections. Sign up to view the full version! View Full Document
Chapter 11: Computer Security and Safety, Ethics, and Privacy MULTIPLE CHOICE 1. A computer ____ risk is any event or action that could cause a loss of or damage to computer hard- ware, software, data, information, or processing capability. a. security c. terrorism b. liability d. network ANS: A PTS: 1 REF: 556 2. A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: B PTS: 1 REF: 556 3. A(n) ____ is someone who uses e-mail as a vehicle for extortion. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: C PTS: 1 REF: 557 4. A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: D PTS: 1 REF: 557 5. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. a. malware c. threats b. untrusted sources d. cybermals ANS: A PTS: 1 REF: 558 6. A(n) ____source is a company or person a user believes will not send a virus-infected file knowingly. a. legitimate c. secure b. trusted d. backup ANS: B PTS: 1 REF: 560
Background image of page 1
7. As shown in the accompanying figure, a(n) ____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. a. hoax c. antivirus b. secure d. antispyware ANS: C PTS: 1 REF: 560 8. A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. a. myth c. DoS b. threat d. hoax ANS: D PTS: 1 REF: 561 9. A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. a. distributed c. limited b. delayed d. staggered ANS: A PTS: 1 REF: 562 10. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. a. Rebuking c. Transmitting b. Spoofing d. Victimizing ANS: B PTS: 1 REF: 563
Background image of page 2
11. ____ use is the use of a computer or its data for unapproved or possibly illegal activities. a. Unacceptable c. Unauthorized b. Illegitimate d. Unenforced ANS: C PTS: 1 REF: 564 12. A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. a. access server c. secure site b. portal d. firewall ANS: D PTS: 1 REF: 564 13. ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious be- havior patterns or system breaches. a.
Background image of page 3
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Create a FREE account now to get started. Log In

The email address you entered is not valid. The email address you provided is already in use.
Your username must be at least 5 characters. Your username must consist of only alphanumeric characters. Your username must contain at least one letter. Your username contains inappropriate language. Another user has already claimed this username.
Your password must be at least 6 characters in length.
{[ $select.selected.label ]} Please select a valid school.
By creating an account you agree to our Privacy Policy, Terms of Use, and Honor Code.
Create my FREE account Processing...
Sign Up with Facebook

We will never post anything without your permission.

Already on Course Hero? Log In