Discovering Computers Chapter 5

Question 1 of 26

Medal-premium 1

What does a disk cleanup utility do?

Select one of the following:

  • Organizes files into consecutive sectors

  • Creates and index of files on the files on the disk

  • searches for and removes unnecessary files

  • Provides file management capabilities

Question 2 of 26

Medal-premium 1

The term, PIN is an acronym for which of the following

Select one of the following:

  • Personal identification number

  • private internet notification

  • possessed information number

  • possessed information network

Question 3 of 26

Medal-premium 1

Which of the following terms is used to describe a program that copies itself repeatedly , using up resources and possibly shutting down the computer or network?

Select one of the following:

  • a virus

  • a worm

  • a trojan horse

  • a rootkit

Question 4 of 26

Medal-premium 1

Which of the following best describes the term, cybercrime?

Select one of the following:

  • Online or internet-based illegal acts

  • any illegal act involving a computer

  • a type of gaming software that stimulates criminal acts

  • using the internet to apprehend and prosecute criminals

Question 5 of 26

Medal-premium 1

Computer viruses, worms, trojan horses, and rootkits are classified as which of the following?

Select one of the following:

  • malware

  • untrusted sources

  • threats

  • cybermalls

Question 6 of 26

Medal-premium 1

Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

Select one of the following:

  • rebuking

  • spoofing

  • transmitting

  • victimizing

Question 7 of 26

Medal-premium 1

The term zombie is?

Select one of the following:

  • a program that performs a repetitive task on a network

  • spam sent via email to spread viruses or commit a distribute denial of service attack

  • a group of compromised computers connected to a network that attacks other networks

  • a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Question 8 of 26

Medal-premium 1

The term back door, as it refers to computer crime is?

Select one of the following:

  • the area of the memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attack in the future

  • a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or netweork

  • the vulnerabilities of a computer criminal network that enables them to be tracked and caught

  • a weakness in a computer or network's security system that enables criminals to gain unauthorized access

Question 9 of 26

Medal-premium 1

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

Select one of the following:

  • They reset the files

  • The index the files

  • They restore the files

  • They resource the files

Question 10 of 26

Medal-premium 1

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

Select one of the following:

  • a virus

  • a worm

  • a trojan horse

  • a rootkit

Question 11 of 26

Medal-premium 1

In order to safeguard your personal information, which of the following is recommended?

Select one of the following:

  • Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them

  • Clear your history file when you are finished browsing

  • Preprint your telephone number on your personal checks so business can reach you quickly if they determine a problem with your purchase.

  • Use shopping club and buying cards when shopping to remain anonymous

Question 12 of 26

Medal-premium 1

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

Select one of the following:

  • data rights

  • acceptable use

  • social restrictions

  • information privacy

Question 13 of 26

Medal-premium 1

Which of the following terms refers to someone who uses the internet or network to destroy or damage computers for political reasons?

Select one of the following:

  • script kiddie

  • cracker

  • cyberextortionist

  • cyberterrorist

Question 14 of 26

Medal-premium 1

What is the term for a website that uses encryption techniques to protect its data?

Select one of the following:

  • Virtual site

  • Locked site

  • secure site

  • vault

Question 15 of 26

Medal-premium 1

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost damaged, or destroyed?

Select one of the following:

  • restored file

  • bot

  • IP file

  • backup

Question 16 of 26

Medal-premium 1

Which of the following is a small test file that a web server stores on a users computer

Select one of the following:

  • worm

  • spike

  • cookie

  • payload

Question 17 of 26

Medal-premium 1

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

Select one of the following:

  • PIN

  • password

  • secure key

  • passterm

Question 18 of 26

Medal-premium 1

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information?

Select one of the following:

  • spam

  • spit

  • phishing

  • spyware

Question 19 of 26

Medal-premium 1

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

Select one of the following:

  • network

  • distribute

  • site

  • multipurpose

Question 20 of 26

Medal-premium 1

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

Select one of the following:

  • script kiddie

  • cracker

  • Cyberextortionist

  • Cyberterrorist

Question 21 of 26

Medal-premium 1

With which of the following do users choose which folders and files to include in a backup?

Select one of the following:

  • full backup

  • incremental backup

  • Differential backup

  • selective backup

Question 22 of 26

Medal-premium 1

The term firewall is

Select one of the following:

  • the access point a hacker uses to intrude on a computer or network

  • a program that searches for cybercriminals by looking for patterns in attacks

  • hardware and/or software that protects a network's resources from intrusion

  • a virus that prevents the computer or network from accessing outside resources

Question 23 of 26

Medal-premium 1

Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure

Select one of the following:

  • hacker

  • script kiddie

  • cyberextortionist

  • cyberterrorist

Question 24 of 26

Medal-premium 1

Internet adverting firms often use which of the following to collect information about users web browsing habits?

Select one of the following:

  • comware

  • postware

  • spyware

  • billware

Question 25 of 26

Medal-premium 1

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Select one of the following:

  • digital security risk

  • information liability

  • technical terrorism

  • network compromise

Question 26 of 26

Medal-premium 1

Which term is used to describe software used by cybercriminals?

Select one of the following:

  • cyberware

  • conware

  • criminalware

  • Crimeware

Icon_fullscreen

Discovering Computers Chapter 5

anajune7
Quiz by , created about 2 years ago

Quiz on Discovering Computers Chapter 5, created by anajune7 on 16/10/2014.

Eye 266
Pin 0
Balloon-left 0
Tags No tags specified
anajune7
Created by anajune7 about 2 years ago
Close