Study Guides (380,000)
CA (150,000)
Concordia (2,000)
BTM (60)
BTM 200 (20)
Quiz

BTM 200 Study Guide - Quiz Guide: Pearson Education, Prentice Hall, Trojan Horse


Department
Business Technology Management
Course Code
BTM 200
Professor
Rafaat Saade
Study Guide
Quiz

This preview shows pages 1-3. to view the full 20 pages of the document.
Technology in Action, Complete 8e (Evans et al.) - Stdnt Txt
Chapter 9: Securing Your System: Protecting Your Digital Data and Devices
1) A ________ is a secure Internet pathway that large corporations use to protect sensitive data.
A) WAN
B) VPN
C) LAN
D) HAN
Answer: B
Diff: 2
Section Ref: How Cool Is This?
2) Which of the following is formally defined as any criminal action perpetrated primarily
through the use of a computer?
A) social networking
B) cybercrime
C) phishing
D) hacking
Answer: B
Diff: 1
Section Ref: Keeping Your Data Safe
3) A computer virus normally attaches itself to another computer program known as a ________.
A) backdoor program
B) Trojan horse
C) host program
D) target program
Answer: C
Diff: 2
Section Ref: Keeping Your Data Safe
4) A ________ is a virus that is triggered when certain conditions are met, such as a file opening
or starting a program a certain number of times.
A) boot-sector virus
B) time bomb
C) Trojan horse
D) logic bomb
Answer: D
Diff: 2
Section Ref: Logic Bombs and Time Bombs
1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Only pages 1-3 are available for preview. Some parts have been intentionally blurred.

5) Which type of virus was the famous Michelangelo virus?
A) a time bomb
B) a worm
C) a script virus
D) an e-mail virus
Answer: A
Diff: 3
Section Ref: Logic Bombs and Time Bombs
6) Which of the following classifications of viruses can change its own code to avoid detection?
A) stealth
B) polymorphic
C) multipartite
D) worm
Answer: B
Diff: 3
Section Ref: Virus Classifications
7) A ________ works independently of host file execution and is much more active in spreading
itself than a virus is.
A) worm
B) DDoS
C) logic bomb
D) time bomb
Answer: A
Diff: 1
Section Ref: Types of Viruses
8) A(n) ________ virus temporarily erases its code from the files where it resides and then hides
in the computer's active memory.
A) e-mail
B) stealth
C) logic
D) macro
Answer: B
Diff: 3
Section Ref: Virus Classifications
9) With regard to computer protection, quarantining is defined as ________.
A) placing a found virus in a secure area on the hard drive
B) updating your antivirus software
C) repairing an infected file
D) deleting an infected file
Answer: A
Diff: 2
Section Ref: Antivirus Software
2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Only pages 1-3 are available for preview. Some parts have been intentionally blurred.

10) During the process of ________ the antivirus software records key attributes about the files
on your computer and keeps these statistics in a safe place on your hard drive.
A) quarantining
B) scanning
C) inoculation
D) encryption
Answer: C
Diff: 2
Section Ref: Antivirus Software
11) A(n) ________ is the portion of virus code that is unique to a particular computer virus.
A) encryption code
B) virus signature
C) compression code
D) virus pattern
Answer: B
Diff: 2
Section Ref: Antivirus Software
12) Drive-by downloads occur when ________.
A) a hacker gains access to your wireless network
B) a macro virus downloads unwanted programs to your computer
C) a Web site downloads harmful software onto your computer
D) software is downloaded to your computer after opening an e-mail attachment
Answer: C
Diff: 3
Section Ref: Software Updates
13) A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
A) use your debit card information to purchase items illegally.
B) assume your identity.
C) steal your logon and passwords for various accounts.
D) launch a denial of service (DoS) attack on your computer.
Answer: D
Diff: 2
Section Ref: What Hackers Steal
14) Which of the following is a program that appears to be something useful or desirable but
does something malicious in the background?
A) a virus
B) a Trojan horse
C) a worm
D) a zombie
Answer: B
Diff: 2
Section Ref: Trojan Horses
3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
You're Reading a Preview

Unlock to view full version