Chapter 10 Quiz

Description

Information Technology Quiz on Chapter 10 Quiz, created by Mary Sunseri on 03/04/2018.
Mary Sunseri
Quiz by Mary Sunseri, updated more than 1 year ago
Mary Sunseri
Created by Mary Sunseri over 7 years ago
6
1
1 2 3 4 5 (0)

Resource summary

Question 1

Question
Which of the following is an advantage of Spy Sweeper over Spyware Doctor?
Answer
  • Spy Sweeper is simply more effective than Spyware Doctor.
  • Spy Sweeper is less expensive than Spyware Doctor.
  • Spy Sweeper has more shield options than Spyware Doctor.
  • Only Spy Sweeper catches adware as well as spyware.

Question 2

Question
What effect did the util-linux Trojan horse of 1999 have?
Answer
  • It used IRC to open a back door to the machine
  • It sent out login information of users logging in
  • It opened up port 1294 for a hacker to use
  • It deleted or corrupted the registry

Question 3

Question
What is the purpose of a Trojan horse?
Answer
  • To delete files.
  • To appear as a good program to ensure that it gets installed on a computer.
  • To change registry keys.
  • To spy on a computer and report back to its origin.

Question 4

Question
Why should downloads of files be restricted to the IT department?
Answer
  • To permit the IT department access to employees’ computers.
  • To prevent access to the organization’s network by malicious software.
  • To centralize billing and payment for downloads.
  • To keep track of what is installed on network computers.

Question 5

Question
Why is blocking pop-up ads good for security?
Answer
  • Pop-up ads can corrupt memory on your system
  • Pop-up ads can be a vehicle for hackers to get into your system
  • Pop-up ads can be a vehicle for spyware or adware to get into your system
  • Pop-up ads reduce productivity

Question 6

Question
Which adware product is involved in suing anti-spyware companies?
Answer
  • SpySweeper
  • Spybot
  • RedSheriff
  • Gator

Question 7

Question
Which is one of the most famous Trojan horses?
Answer
  • Dropper
  • NetBus
  • Back Orifice
  • Util-Linux

Question 8

Question
Why are hidden file extensions a security threat?
Answer
  • User cannot properly organize their systems without knowing accurate file extensions.
  • Virus scanners have trouble with files whose extensions are hidden.
  • User might download an image that is really a malicious executable.
  • Hidden extensions almost always indicate a worm.

Question 9

Question
Which of the following are the two most common things Trojan horse programs do?
Answer
  • Launch DDoS attacks and open back doors
  • Install spyware and launch Ping of Death attacks
  • Hijack the home page and delete registry keys
  • Delete registry keys and alter system files

Question 10

Question
Why should users be cautious of hidden file extensions?
Answer
  • The files are usually executable.
  • They often are used to hide Trojan horses.
  • The wrong application is likely to open.
  • They make it difficult to establish file-application associations.

Question 11

Question
Which of the following is NOT an effective means of protecting against spyware?
Answer
  • Block scripts, applets, and other active programming in the Web browser.
  • Never download any attachment unless expecting it or certain it is safe.
  • Block all browser cookies or limit their duration.
  • Download files and programs to a separate folder until they are verified safe.

Question 12

Question
What is RedSheriff?
Answer
  • Adware that is downloaded automatically when you visit certain Web sites.
  • Spyware that gathers information about you when you visit a web site
  • Adware that is often attached to free programs found on the Internet.
  • Spyware that gets banking information from your hard drive

Question 13

Question
Which of the following most accurately explains why minimum necessary privileges for a user help protect against Trojan horses?
Answer
  • If the user cannot install programs, it is less likely that he will install a Trojan horse.
  • If a user cannot remove programs, then he cannot remove anti-spyware and antivirus software accidentally.
  • If the user cannot install programs, it is completely impossible that he will install a Trojan horse.
  • If the user cannot remove programs, he cannot alter the security settings you have put on his machine.

Question 14

Question
The filename mypic.jpg.exe is an example of a(n):
Answer
  • JPEG image file.
  • executable image.
  • computer virus.
  • hidden file extension.

Question 15

Question
Which is a product for identifying and removing spyware and adware?
Answer
  • RedSheriff
  • Webroot
  • Spy Sweeper
  • Gator

Question 16

Question
Manually removing spyware usually requires all but which of the following actions?
Answer
  • Reinstalling Windows
  • Reinstalling antivirus software
  • Formatting the hard drive
  • Removing keys from the registry

Question 17

Question
What does Back Orifice do to a system?
Answer
  • Provides a remote user complete administrative access to the machine
  • Deletes or corrupts Microsoft Office applications
  • Launches a DDoS at Microsoft sites
  • Installs a virus on the infected system

Question 18

Question
NetBus, Back Orifice and most similar Trojan horses are removed from an infected computer system by:
Answer
  • scanning the system with anti-spyware software.
  • installing a personal firewall.
  • scanning the system with an antivirus scanner.
  • editing the registry.

Question 19

Question
What did the util-linux Trojan horse do in 1999?
Answer
  • It prevented infected computers from accessing the Internet.
  • It deleted essential operating system files from network computers.
  • It captured log on information from infected computers to send to its creator.
  • It gained access to infected computers by deleting log on restrictions.

Question 20

Question
What is the purpose of spyware?
Answer
  • To manage popups and prevent nuisance advertising.
  • To monitor a system, gain access to log on information, and allow access to from the outside.
  • To monitor a system, gather information, and make it available to another.
  • To prevent others from detecting the presence of your computer on the network.

Question 21

Question
What does adware do?
Answer
  • It prevents users from blocking online popups while browsing the Internet.
  • It monitors user’s activities to provide targeted advertising while surfing the Internet.
  • It creates popup advertising directly on the user’s machine.
  • It downloads popup advertising within the Web browser.

Question 22

Question
Which is spyware loaded from a Web page via Java and purported to be a simple marketing tool?
Answer
  • Webroot
  • Spybot
  • SpySweeper
  • RedSheriff

Question 23

Question
Why would you want to restrict cookies?
Answer
  • Cookies consume system memory.
  • Cookies take up hard drive space.
  • Cookies are often infected with a virus.
  • Any Web site can read any cookie.

Question 24

Question
Which is NOT a likely symptom of a Trojan horse infection?
Answer
  • CD-ROM and other devices seem to work on their own.
  • Passwords, usernames, or accounts change.
  • Browser home page changes.
  • Clock time is incorrect.

Question 25

Question
Which of the following is an advantage of Spyware Doctor over Spy Sweeper?
Answer
  • Spy Sweeper is simply more effective than Spyware Doctor.
  • Only Spy Sweeper catches adware as well as spyware.
  • Spy Sweeper has more shield options than Spyware Doctor.
  • Spy Sweeper is less expensive than Spyware Doctor.

Question 26

Question
What is Gator?
Answer
  • Spyware that gathers information about you when you visit a web site
  • Adware that is downloaded automatically when you visit certain Web sites.
  • Spyware that gets banking information from your hard drive
  • Adware that is often attached to free programs found on the Internet.

Question 27

Question
Which Trojan horse is a small, self-installing remote administration system that permits a user to control the infected system across a TCP/IP connection?
Answer
  • Spybot
  • NetBus
  • Dropper
  • Back Orifice

Question 28

Question
Which of the following is the most insidious aspect of Back Orifice?
Answer
  • It is small
  • It spreads via email
  • It does not show up in the talk list
  • It appears to be a legitimate program

Question 29

Question
What is the best approach to preventing systems from being exploited by a Trojan horse?
Answer
  • Technological and policy measures.
  • Anti-spam software.
  • Software scanners.
  • High security firewalls.

Question 30

Question
Which is probably the most frequent action of Trojan horse attacks?
Answer
  • Searching for personal information.
  • Installing spyware and malware.
  • Installing back doors and executing DoS attacks.
  • Erasing files on a computer.

Question 31

Question
Which remote administration tool only operates on port 20034?
Answer
  • Spybot
  • Back Orifice
  • NetBus
  • Portal of Doom

Question 32

Question
What was the worst aspect of the Internet Explorer Trojan horse of 2003?
Answer
  • It deleted system files
  • It corrupted the registry.
  • There was no patch for it.
  • The path for it had security flaws.

Question 33

Question
Which of the following is the most likely reason you might wish to restrict Java applets?
Answer
  • Java applets can easily be modified to act as spyware.
  • Java applets serve no useful purpose other than virus delivery.
  • Java applets can delete files on your hard drive.
  • Java applets usually contain viruses.
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
The Internet
Gee_0599
Ch1 - The nature of IT Projects
mauricio5509
CCNA Answers – CCNA Exam
Abdul Demir
SQL Quiz
R M
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002