Discovering Computers Chapter 5

Beschreibung

Quiz am Discovering Computers Chapter 5, erstellt von anajune7 am 16/10/2014.
anajune7
Quiz von anajune7, aktualisiert more than 1 year ago
anajune7
Erstellt von anajune7 vor mehr als 9 Jahre
296
0

Zusammenfassung der Ressource

Frage 1

Frage
What does a disk cleanup utility do?
Antworten
  • Organizes files into consecutive sectors
  • Creates and index of files on the files on the disk
  • searches for and removes unnecessary files
  • Provides file management capabilities

Frage 2

Frage
The term, PIN is an acronym for which of the following
Antworten
  • Personal identification number
  • private internet notification
  • possessed information number
  • possessed information network

Frage 3

Frage
Which of the following terms is used to describe a program that copies itself repeatedly , using up resources and possibly shutting down the computer or network?
Antworten
  • a virus
  • a worm
  • a trojan horse
  • a rootkit

Frage 4

Frage
Which of the following best describes the term, cybercrime?
Antworten
  • Online or internet-based illegal acts
  • any illegal act involving a computer
  • a type of gaming software that stimulates criminal acts
  • using the internet to apprehend and prosecute criminals

Frage 5

Frage
Computer viruses, worms, trojan horses, and rootkits are classified as which of the following?
Antworten
  • malware
  • untrusted sources
  • threats
  • cybermalls

Frage 6

Frage
Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Antworten
  • rebuking
  • spoofing
  • transmitting
  • victimizing

Frage 7

Frage
The term zombie is?
Antworten
  • a program that performs a repetitive task on a network
  • spam sent via email to spread viruses or commit a distribute denial of service attack
  • a group of compromised computers connected to a network that attacks other networks
  • a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Frage 8

Frage
The term back door, as it refers to computer crime is?
Antworten
  • the area of the memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attack in the future
  • a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or netweork
  • the vulnerabilities of a computer criminal network that enables them to be tracked and caught
  • a weakness in a computer or network's security system that enables criminals to gain unauthorized access

Frage 9

Frage
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
Antworten
  • They reset the files
  • The index the files
  • They restore the files
  • They resource the files

Frage 10

Frage
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
Antworten
  • a virus
  • a worm
  • a trojan horse
  • a rootkit

Frage 11

Frage
In order to safeguard your personal information, which of the following is recommended?
Antworten
  • Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them
  • Clear your history file when you are finished browsing
  • Preprint your telephone number on your personal checks so business can reach you quickly if they determine a problem with your purchase.
  • Use shopping club and buying cards when shopping to remain anonymous

Frage 12

Frage
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
Antworten
  • data rights
  • acceptable use
  • social restrictions
  • information privacy

Frage 13

Frage
Which of the following terms refers to someone who uses the internet or network to destroy or damage computers for political reasons?
Antworten
  • script kiddie
  • cracker
  • cyberextortionist
  • cyberterrorist

Frage 14

Frage
What is the term for a website that uses encryption techniques to protect its data?
Antworten
  • Virtual site
  • Locked site
  • secure site
  • vault

Frage 15

Frage
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost damaged, or destroyed?
Antworten
  • restored file
  • bot
  • IP file
  • backup

Frage 16

Frage
Which of the following is a small test file that a web server stores on a users computer
Antworten
  • worm
  • spike
  • cookie
  • payload

Frage 17

Frage
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
Antworten
  • PIN
  • password
  • secure key
  • passterm

Frage 18

Frage
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information?
Antworten
  • spam
  • spit
  • phishing
  • spyware

Frage 19

Frage
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
Antworten
  • network
  • distribute
  • site
  • multipurpose

Frage 20

Frage
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
Antworten
  • script kiddie
  • cracker
  • Cyberextortionist
  • Cyberterrorist

Frage 21

Frage
With which of the following do users choose which folders and files to include in a backup?
Antworten
  • full backup
  • incremental backup
  • Differential backup
  • selective backup

Frage 22

Frage
The term firewall is
Antworten
  • the access point a hacker uses to intrude on a computer or network
  • a program that searches for cybercriminals by looking for patterns in attacks
  • hardware and/or software that protects a network's resources from intrusion
  • a virus that prevents the computer or network from accessing outside resources

Frage 23

Frage
Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
Antworten
  • hacker
  • script kiddie
  • cyberextortionist
  • cyberterrorist

Frage 24

Frage
Internet adverting firms often use which of the following to collect information about users web browsing habits?
Antworten
  • comware
  • postware
  • spyware
  • billware

Frage 25

Frage
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
Antworten
  • digital security risk
  • information liability
  • technical terrorism
  • network compromise

Frage 26

Frage
Which term is used to describe software used by cybercriminals?
Antworten
  • cyberware
  • conware
  • criminalware
  • Crimeware
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

ExamTime Erste Schritte
JohannesK
Geographie Quiz
AntonS
Blut
Paula <3
2C Entwicklungspsychologie
petra.drewitz
IKA-Theoriefragen Serie 18 (15 Fragen)
IKA ON ICT GmbH
Thermodynamik I/II
K G
Industrielle Revolution und soziale Frage
bibi97
Ökologie
vere2400
KORRE VO - Fragenkatalog überarbeitet
Jennifer Riegler
BAS1 Übungsfragen
B G
Vetie - Arzneimittelverordnung 2014
Peter Christian Ponn