anajune7
Quiz por , criado more than 1 year ago

Quiz sobre Discovering Computers Chapter 5, criado por anajune7 em 16-10-2014.

297
0
0
Sem etiquetas
anajune7
Criado por anajune7 mais de 9 anos atrás
Fechar

Discovering Computers Chapter 5

Questão 1 de 26

1

What does a disk cleanup utility do?

Selecione uma das seguintes:

  • Organizes files into consecutive sectors

  • Creates and index of files on the files on the disk

  • searches for and removes unnecessary files

  • Provides file management capabilities

Explicação

Questão 2 de 26

1

The term, PIN is an acronym for which of the following

Selecione uma das seguintes:

  • Personal identification number

  • private internet notification

  • possessed information number

  • possessed information network

Explicação

Questão 3 de 26

1

Which of the following terms is used to describe a program that copies itself repeatedly , using up resources and possibly shutting down the computer or network?

Selecione uma das seguintes:

  • a virus

  • a worm

  • a trojan horse

  • a rootkit

Explicação

Questão 4 de 26

1

Which of the following best describes the term, cybercrime?

Selecione uma das seguintes:

  • Online or internet-based illegal acts

  • any illegal act involving a computer

  • a type of gaming software that stimulates criminal acts

  • using the internet to apprehend and prosecute criminals

Explicação

Questão 5 de 26

1

Computer viruses, worms, trojan horses, and rootkits are classified as which of the following?

Selecione uma das seguintes:

  • malware

  • untrusted sources

  • threats

  • cybermalls

Explicação

Questão 6 de 26

1

Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

Selecione uma das seguintes:

  • rebuking

  • spoofing

  • transmitting

  • victimizing

Explicação

Questão 7 de 26

1

The term zombie is?

Selecione uma das seguintes:

  • a program that performs a repetitive task on a network

  • spam sent via email to spread viruses or commit a distribute denial of service attack

  • a group of compromised computers connected to a network that attacks other networks

  • a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Explicação

Questão 8 de 26

1

The term back door, as it refers to computer crime is?

Selecione uma das seguintes:

  • the area of the memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attack in the future

  • a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or netweork

  • the vulnerabilities of a computer criminal network that enables them to be tracked and caught

  • a weakness in a computer or network's security system that enables criminals to gain unauthorized access

Explicação

Questão 9 de 26

1

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

Selecione uma das seguintes:

  • They reset the files

  • The index the files

  • They restore the files

  • They resource the files

Explicação

Questão 10 de 26

1

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

Selecione uma das seguintes:

  • a virus

  • a worm

  • a trojan horse

  • a rootkit

Explicação

Questão 11 de 26

1

In order to safeguard your personal information, which of the following is recommended?

Selecione uma das seguintes:

  • Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them

  • Clear your history file when you are finished browsing

  • Preprint your telephone number on your personal checks so business can reach you quickly if they determine a problem with your purchase.

  • Use shopping club and buying cards when shopping to remain anonymous

Explicação

Questão 12 de 26

1

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

Selecione uma das seguintes:

  • data rights

  • acceptable use

  • social restrictions

  • information privacy

Explicação

Questão 13 de 26

1

Which of the following terms refers to someone who uses the internet or network to destroy or damage computers for political reasons?

Selecione uma das seguintes:

  • script kiddie

  • cracker

  • cyberextortionist

  • cyberterrorist

Explicação

Questão 14 de 26

1

What is the term for a website that uses encryption techniques to protect its data?

Selecione uma das seguintes:

  • Virtual site

  • Locked site

  • secure site

  • vault

Explicação

Questão 15 de 26

1

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost damaged, or destroyed?

Selecione uma das seguintes:

  • restored file

  • bot

  • IP file

  • backup

Explicação

Questão 16 de 26

1

Which of the following is a small test file that a web server stores on a users computer

Selecione uma das seguintes:

  • worm

  • spike

  • cookie

  • payload

Explicação

Questão 17 de 26

1

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

Selecione uma das seguintes:

  • PIN

  • password

  • secure key

  • passterm

Explicação

Questão 18 de 26

1

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information?

Selecione uma das seguintes:

  • spam

  • spit

  • phishing

  • spyware

Explicação

Questão 19 de 26

1

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?

Selecione uma das seguintes:

  • network

  • distribute

  • site

  • multipurpose

Explicação

Questão 20 de 26

1

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

Selecione uma das seguintes:

  • script kiddie

  • cracker

  • Cyberextortionist

  • Cyberterrorist

Explicação

Questão 21 de 26

1

With which of the following do users choose which folders and files to include in a backup?

Selecione uma das seguintes:

  • full backup

  • incremental backup

  • Differential backup

  • selective backup

Explicação

Questão 22 de 26

1

The term firewall is

Selecione uma das seguintes:

  • the access point a hacker uses to intrude on a computer or network

  • a program that searches for cybercriminals by looking for patterns in attacks

  • hardware and/or software that protects a network's resources from intrusion

  • a virus that prevents the computer or network from accessing outside resources

Explicação

Questão 23 de 26

1

Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure

Selecione uma das seguintes:

  • hacker

  • script kiddie

  • cyberextortionist

  • cyberterrorist

Explicação

Questão 24 de 26

1

Internet adverting firms often use which of the following to collect information about users web browsing habits?

Selecione uma das seguintes:

  • comware

  • postware

  • spyware

  • billware

Explicação

Questão 25 de 26

1

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Selecione uma das seguintes:

  • digital security risk

  • information liability

  • technical terrorism

  • network compromise

Explicação

Questão 26 de 26

1

Which term is used to describe software used by cybercriminals?

Selecione uma das seguintes:

  • cyberware

  • conware

  • criminalware

  • Crimeware

Explicação