Chapter 11 test

Chapter 11 Test
Download Document
Showing pages : 1 - 4 of 34
This preview has blurred sections. Sign up to view the full version! View Full Document
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Chapter 11: Computer Security and Safety, Ethics, and Privacy MULTIPLE CHOICE 1. A computer ____ risk is any event or action that could cause a loss of or damage to computer hard-ware, software, data, information, or processing capability. a. security c. terrorism b. liability d. network ANS: A PTS: 1 REF: 556 2. A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: B PTS: 1 REF: 556 3. A(n) ____ is someone who uses e-mail as a vehicle for extortion. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: C PTS: 1 REF: 557 4. A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons. a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist ANS: D PTS: 1 REF: 557 5. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a users knowledge and deliberately alter the computers operations. a. malware c. threats b. untrusted sources d. cybermals ANS: A PTS: 1 REF: 558 6. A(n) ____source is a company or person a user believes will not send a virus-infected file knowingly. a. legitimate c. secure b. trusted d. backup ANS: B PTS: 1 REF: 560 7. As shown in the accompanying figure, a(n) ____ program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. a. hoax c. antivirus b. secure d. antispyware ANS: C PTS: 1 REF: 560 8. A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. a. myth c. DoS b. threat d. hoax ANS: D PTS: 1 REF: 561 9. A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. a. distributed c. limited b. delayed d. staggered ANS: A PTS: 1 REF: 562 10. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. a. Rebuking c. Transmitting b. Spoofing d. Victimizing ANS: B PTS: 1 REF: 563 11. ____ use is the use of a computer or its data for unapproved or possibly illegal activities. a. Unacceptable c. Unauthorized b. Illegitimate d. Unenforced ANS: C PTS: 1 REF: 564 12. A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. a. access server c. secure site b. portal d. firewall ANS: D PTS: 1 REF: 564 13. ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious be-havior patterns or system breaches. ...
View Full Document