Chapter 11 - Chapter 11 Multiple Choice Identify the letter...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 1. The term _____ refers to online or Internet-based illegal acts. a. malicious-logic program c. cybercrime b. computer crime d. system failure ____ 2. A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. a. computer virus c. Trojan horse b. worm d. all of the above ____ 3. A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. a. computer virus c. Trojan horse b. worm d. all of the above ____ 4. The _____ is the destructive event or prank a malicious-logic program is intended to deliver. a. zombie c. cracker b. hash d. Payload ____ 5. Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user _____. a. opens an infected file b. runs an infected program c. boots the computer with an infected disk in a disk drive d. all of the above ____ 6. Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program. a. macros c. cookies b. logs d. Spikes ____ 7. To _____ a program file, an antivirus program records information such as the file size and file creation date in a separate file. a. quarantine c. blackout b. decrypt d. Inoculate ____ 8. A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed. a. quarantine c. firewall b. payload d. Honeypot
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
____ 9. The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems. a. cookie c. zombie b. proxy d. Standby ____ 10. A honeypot is a program designed to _____. a. negatively affect the way a computer works b. entice an intruder to hack into a computer c. identify and remove computer viruses found in memory d. secretly collect information about a user ____ 11. To prevent unauthorized access and use, at a minimum a company should have a written _____ that outlines the computer activities for which a computer or network may and may not be used. a. acceptable use policy (AUP) c. performance guarantee policy (PGP) b. universal procedures standard (UPS) d. maintenance security dictum (MSD) ____ 12. Each character added to a password significantly _____ it might take for someone or for a hacker’s computer to guess the password. a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/12/2011 for the course COMP 0112 taught by Professor Mr.kwok during the Summer '11 term at Hong Kong Baptist University, China.

Page1 / 6

Chapter 11 - Chapter 11 Multiple Choice Identify the letter...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online